Jan. 1, 2023, 9:15 a.m. |

National Vulnerability Database web.nvd.nist.gov

A vulnerability classified as problematic was found in Zenoss Dashboard up to 1.3.4. Affected by this vulnerability is an unknown functionality of the file ZenPacks/zenoss/Dashboard/browser/resources/js/defaultportlets.js. The manipulation of the argument HTMLString leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.5 is able to address this issue. The name of the patch is f462285a0a2d7e1a9255b0820240b94a43b00a44. It is recommended to upgrade the affected component. The identifier VDB-217153 was assigned to this vulnerability.

address argument attack browser classified cross site scripting cve dashboard file issue manipulation name patch resources scripting version version 1 vulnerability zenoss

Information Security Engineers

@ D. E. Shaw Research | New York City

Cyber Security Professional

@ BT Group | 25A DLF City Phase-III,, Gurugram, India

Head of Cyber Security Operations

@ Vector Limited | Auckland, New Zealand

Security Analyst (SOC)

@ Accesa & RaRo | Cluj-Napoca, Romania

Senior - IT Compliance-Cyber (Technology Risk Consulting)

@ EY | Bengaluru, KA, IN, 560016

Security Automation Engineer Internship - Secure Development Team Product Security (Brno, Czech Republic)

@ Red Hat | Brno, Czechia