{"id":17878,"date":"2022-02-22T08:58:55","date_gmt":"2022-02-22T07:58:55","guid":{"rendered":"https:\/\/herolab.usd.de\/?p=17878"},"modified":"2022-02-22T09:01:00","modified_gmt":"2022-02-22T08:01:00","slug":"security-advisory-thruk-monitoring-v2-46-3","status":"publish","type":"post","link":"https:\/\/herolab.usd.de\/en\/security-advisory-thruk-monitoring-v2-46-3\/","title":{"rendered":"Security Advisory for Thruk Monitoring &lt; v2.46.3"},"content":{"rendered":"\n<p>Our analysts at usd HeroLab have examined the Thruk monitoring web interface for e.g. Naemon, Nagios or Icinga during their security analysis.<\/p>\n\n\n\n<p>A reflected Cross-site Scripting in the login mask was identified, which could be exploited by an unauthenticated attacker. The vulnerability was reported to the vendor and has been fixed in the v2.46.3 release.<\/p>\n\n\n\n<p>The disclosure of the vulnerabilities is in accordance with usd HeroLab's&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\">Responsible Disclosure Policy<\/a>. Detailed information about this advisory can be found&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2021-0034\/\">here<\/a>.<\/p>\n\n\n\n<p><strong>About usd HeroLab Security Advisories<\/strong><\/p>\n\n\n\n<p>In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.<\/p>\n\n\n\n<p>We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues \u2013 always in line with our&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Disclosure Policy<\/a>.<\/p>\n\n\n\n<p>Always in the name of our mission: \u201cmore security.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our analysts at usd HeroLab have examined the Thruk monitoring web interface for e.g. Naemon, Nagios or Icinga during their security analysis. A reflected Cross-site Scripting in the login mask was identified, which could be exploited by an unauthenticated attacker. The vulnerability was reported to the vendor and has been fixed in the v2.46.3 release. [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[85],"tags":[88,128,86],"class_list":["post-17878","post","type-post","status-publish","format-standard","hentry","category-security-advisories-en","tag-pentest-en","tag-security-analysis-en","tag-security-research-en"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/posts\/17878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=17878"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/posts\/17878\/revisions"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=17878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/categories?post=17878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/tags?post=17878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}