{"openvas": [{"lastseen": "2019-10-01T15:10:10", "description": "The host is installed with Centreon\n and is prone to a cross-site scripting vulnerability.", "cvss3": {}, "published": "2017-09-11T00:00:00", "type": "openvas", "title": "Centreon 'Comments' POST Parameter Cross Site Scripting Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-7672"], "modified": "2019-09-30T00:00:00", "id": "OPENVAS:1361412562310811735", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811735", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Centreon 'Comments' POST Parameter Cross Site Scripting Vulnerability\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:centreon:centreon\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811735\");\n script_version(\"2019-09-30T15:22:24+0000\");\n script_cve_id(\"CVE-2015-7672\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2019-09-30 15:22:24 +0000 (Mon, 30 Sep 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-09-11 13:47:50 +0530 (Mon, 11 Sep 2017)\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_name(\"Centreon 'Comments' POST Parameter Cross Site Scripting Vulnerability\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Centreon\n and is prone to a cross-site scripting vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to insufficient\n sanitization of input passed via 'Comments' POST parameter to main.php script.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to execute arbitrary scripts in the logged-in user's web browser.\");\n\n script_tag(name:\"affected\", value:\"Centreon version 2.x up to 2.8.26.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to version 2.8.27, 18.10.0 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.27.html\");\n script_xref(name:\"URL\", value:\"https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html\");\n script_xref(name:\"URL\", value:\"https://github.com/centreon/centreon/pull/6953\");\n script_xref(name:\"URL\", value:\"https://www.youtube.com/watch?v=sIONzwQAngU\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"centreon_detect.nasl\");\n script_mandatory_keys(\"centreon/installed\");\n script_require_ports(\"Services/www\", 80);\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!port = get_app_port(cpe:CPE))\n exit(0);\n\nif(!vers = get_app_version(cpe:CPE, port:port))\n exit(0);\n\nif(version_in_range(version:vers, test_version:\"2.0.0\", test_version2:\"2.8.26\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"2.8.27/18.10.0\");\n security_message(data:report, port:port);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}]}