ID: 2613
Title: Additional fix for refleced XSS on index page using start_url
Component: Multisite
Level: 1
Class: Security Fix
Version: 1.2.7i3
The issue has already been addressed in werk #2388, but was not really
fixing the problem for all cases.
ID: 2612
Title: Fixed possible XSS on service detail page using the long service output
Component: Multisite
Level: 2
Class: Security Fix
Version: 1.2.7i3
Normaly all check results displayed in the GUI are HTML escaped by default.
The escaping was missing for the long service output of the service detail
page. So one could create multi line check results containing HTML/Javascript
code which would be executed when a user opens the service detail page of
the service with the check result containing the injected code.
The issue has been fixed by escaping the long output exactly like the normal
plugin output. One difference is left: newline characters are replaced by
HTML newlines to make displaying of multiple lines still possible.
If you want the old behaviour back, you can disable the plugin output escaping
using the global settings. But please note that an attacker might be able to
inject javascript code.