Zenoss Monitoring System HTML Injection and Open redirection Vulnerabilities

Zenoss Monitoring System is prone to HTML-injection and open-redirection vulnerabilities.

Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user and for open-redirection by constructing a crafted URI and enticing a user to follow it. When an unsuspecting victim follows the link, they may be redirected to an attacker-controlled site; this may aid in phishing attacks. Other attacks are also possible.

Zenoss Monitoring System 4.2.5 is vulnerable; other versions may also affected.


 

Privacy Statement
Copyright 2010, SecurityFocus