Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Dismissed
Permalink CVE-2019-25371
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 1 week ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed
    6 packages
    • prometheus-opnsense-exporter
    • python312Packages.pyopnsense
    • python313Packages.pyopnsense
    • python314Packages.pyopnsense
    • home-assistant-component-tests.opnsense
    • tests.home-assistant-component-tests.opnsense
  • @jopejoe1 dismissed
OPNsense 19.1 Reflected XSS via diag_ping.php

OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by exploiting insufficient input validation in the host parameter. Attackers can submit crafted POST requests to the diag_ping.php endpoint with script payloads in the host parameter to execute arbitrary JavaScript in users' browsers.

Affected products

OPNsense
  • ==19.1
Not present in nixpkgs