The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Ganglia

vulnerability bulletin 21633

Ganglia Web: Cross Site Scripting via the metrics API

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via an API of Ganglia Web, in order to run JavaScript code in the context of the web site.
Impacted products: Ganglia.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 19/01/2017.
Identifiers: VIGILANCE-VUL-21633.

Description of the vulnerability

The Ganglia product offers a web interface.

However, it does not filter received data via API before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting via an API of Ganglia Web, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability note 19984

Ganglia Web: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of Ganglia Web, in order to run JavaScript code in the context of the web site.
Impacted products: Fedora, Ganglia.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 28/06/2016.
Identifiers: FEDORA-2016-8749c58855, FEDORA-2016-d349b1c5f1, VIGILANCE-VUL-19984.

Description of the vulnerability

The Ganglia Web product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of Ganglia Web, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2015-6816

Ganglia Web: privilege escalation via Cookie

Synthesis of the vulnerability

An attacker can use a Cookie containing a serialized boolean to bypass the authentication of Ganglia Web, in order to escalate his privileges.
Impacted products: Fedora, Ganglia.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet client.
Creation date: 07/09/2015.
Identifiers: CVE-2015-6816, FEDORA-2015-accdc7ebfc, FEDORA-2015-ee7a2b5844, VIGILANCE-VUL-17823.

Description of the vulnerability

The Ganglia Web product offers a web service for Ganglia.

The PHP language is tolerant on comparisons, so the following expression is true because the string hello is not null: "hello" == TRUE.

However, the init() function of the GangliaAuth.php file compares the authentication token with a value which can be controlled by the user. If the user serializes the value TRUE, the token comparison is thus always true.

An attacker can therefore use a Cookie containing a serialized boolean to bypass the authentication of Ganglia Web, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Ganglia: