[Nagios-devel] escaping/sanitizing plugin output in nagios web
-
Guest
[Nagios-devel] escaping/sanitizing plugin output in nagios web
--=-rt9GMhadlpQTaGqpCIT4
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable
hey ethan et al,
someone raised a bug in the debian bts:
http://bugs.debian.org/cgi-bin/bugrepor ... g=3D416814
basically bringing to light the fact that the output from various
plugins is placed verbatim into web page output. the theoretical
problem with this is that some remote host could place XSS code in the
output, making it possible to hijack/co-opt the nagios admin's web
browser to do naughty things.
of course in practice most monitored hosts are part of the same internal
network, and this is *mostly* not an issue when you trust the checks
that you're hosting... but it is a valid issue nonetheless i'd say.
the problem could be solved on the plugin level, but i think it's more
appropriate that it's addressed in the web interface itself. maybe a
new service or cgi option could be added to escape the output, or maybe
provide a list of "safe" tags or something?
sean
--=-rt9GMhadlpQTaGqpCIT4
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQBGEXI0ynjLPm522B0RAscUAJ9QvxjpFMbRXy4hO3yD3njNGp3KKwCghmLf
PvBAjKTs0jKWvhg+ej0iTyg=
=T4FH
-----END PGP SIGNATURE-----
--=-rt9GMhadlpQTaGqpCIT4--
This post was automatically imported from historical nagios-devel mailing list archives
Original poster: [email protected]