Name | CVE-2019-9834 |
Description | The Netdata web application through 1.13.0 allows remote attackers to inject their own malicious HTML code into an imported snapshot, aka HTML Injection. Successful exploitation will allow attacker-supplied HTML to run in the context of the affected browser, potentially allowing the attacker to steal authentication credentials or to control how the site is rendered to the user. NOTE: the vendor disputes the risk because there is a clear warning next to the button for importing a snapshot |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
netdata (PTS) | buster | 1.12.0-1+deb10u1 | vulnerable |
| bullseye | 1.29.3-4 | vulnerable |
| bookworm | 1.37.1-2 | vulnerable |
| sid | 1.47.5-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
netdata | source | (unstable) | (unfixed) | unimportant | | |
Notes
https://github.com/netdata/netdata/issues/5800#issuecomment-510986112
Risk disupted by upstream because there is a clear warning next to the
button for importing a snapshot, thus treat the issue as unimportant with
negligible impact.