CVE-2023-41791: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Pandora FMS Pandora FMS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). This vulnerability allowed users with low privileges to introduce Javascript executables via a translation string that could affect the integrity of some configuration files. This issue affects Pandora FMS: from 700 through 773.
AI Analysis
Technical Summary
CVE-2023-41791 is a high-severity Cross-Site Scripting (XSS) vulnerability affecting Pandora FMS versions from 700 through 773. Pandora FMS is a monitoring software used to oversee IT infrastructure and services. The vulnerability arises from improper neutralization of input during web page generation, specifically through translation strings that allow low-privileged users to inject malicious JavaScript code. This injected code can execute in the context of the web application, potentially compromising the integrity of some configuration files. The vulnerability is classified under CWE-79, indicating that the root cause is failure to properly sanitize or encode user input before rendering it in a web page. According to the CVSS 3.1 score of 8.4 (high), the vulnerability has network attack vector (AV:N), requires high attack complexity (AC:H), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality (C:H), integrity (I:L), and availability (A:H) with scope changed (S:C). This means an attacker can remotely exploit this vulnerability without user interaction but must overcome some complexity, and the attack can affect resources beyond the vulnerable component. Although no known exploits are currently reported in the wild, the potential for exploitation exists given the nature of XSS and the impact on configuration file integrity. The vulnerability could allow attackers to execute arbitrary scripts, potentially leading to session hijacking, unauthorized configuration changes, or denial of service through corrupted configurations. Since Pandora FMS is used in enterprise environments for monitoring critical infrastructure, exploitation could disrupt monitoring capabilities and impact operational security.
Potential Impact
For European organizations, the impact of CVE-2023-41791 can be significant, especially for those relying on Pandora FMS for IT infrastructure monitoring and management. Successful exploitation could lead to unauthorized access to sensitive monitoring data, manipulation of configuration files, and disruption of monitoring services. This can degrade the organization's ability to detect and respond to other security incidents, increasing overall risk exposure. The high confidentiality impact means sensitive operational data could be leaked, while the availability impact could cause downtime or degraded performance of monitoring systems. Given the critical role of monitoring in sectors such as finance, healthcare, energy, and government, exploitation could have cascading effects on service continuity and regulatory compliance. Furthermore, since the vulnerability can be exploited by low-privileged users without user interaction, insider threats or compromised accounts could be leveraged to escalate attacks. The complexity of the attack is high, which may limit widespread exploitation, but targeted attacks against high-value European organizations remain a concern.
Mitigation Recommendations
To mitigate CVE-2023-41791, European organizations should immediately upgrade Pandora FMS to a version where this vulnerability is patched once available. In the interim, organizations should implement strict input validation and output encoding on all user-supplied data, especially translation strings and configuration inputs. Restrict access to the Pandora FMS web interface to trusted networks and users, employing network segmentation and strong authentication mechanisms. Monitor logs for unusual activity indicative of XSS attempts or configuration file changes. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the web application context. Conduct regular security assessments and penetration testing focused on web application vulnerabilities. Additionally, educate administrators and users about the risks of XSS and the importance of using least privilege principles to minimize the impact of compromised accounts. Finally, maintain up-to-date backups of configuration files to enable rapid recovery in case of tampering.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2023-41791: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Pandora FMS Pandora FMS
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). This vulnerability allowed users with low privileges to introduce Javascript executables via a translation string that could affect the integrity of some configuration files. This issue affects Pandora FMS: from 700 through 773.
AI-Powered Analysis
Technical Analysis
CVE-2023-41791 is a high-severity Cross-Site Scripting (XSS) vulnerability affecting Pandora FMS versions from 700 through 773. Pandora FMS is a monitoring software used to oversee IT infrastructure and services. The vulnerability arises from improper neutralization of input during web page generation, specifically through translation strings that allow low-privileged users to inject malicious JavaScript code. This injected code can execute in the context of the web application, potentially compromising the integrity of some configuration files. The vulnerability is classified under CWE-79, indicating that the root cause is failure to properly sanitize or encode user input before rendering it in a web page. According to the CVSS 3.1 score of 8.4 (high), the vulnerability has network attack vector (AV:N), requires high attack complexity (AC:H), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality (C:H), integrity (I:L), and availability (A:H) with scope changed (S:C). This means an attacker can remotely exploit this vulnerability without user interaction but must overcome some complexity, and the attack can affect resources beyond the vulnerable component. Although no known exploits are currently reported in the wild, the potential for exploitation exists given the nature of XSS and the impact on configuration file integrity. The vulnerability could allow attackers to execute arbitrary scripts, potentially leading to session hijacking, unauthorized configuration changes, or denial of service through corrupted configurations. Since Pandora FMS is used in enterprise environments for monitoring critical infrastructure, exploitation could disrupt monitoring capabilities and impact operational security.
Potential Impact
For European organizations, the impact of CVE-2023-41791 can be significant, especially for those relying on Pandora FMS for IT infrastructure monitoring and management. Successful exploitation could lead to unauthorized access to sensitive monitoring data, manipulation of configuration files, and disruption of monitoring services. This can degrade the organization's ability to detect and respond to other security incidents, increasing overall risk exposure. The high confidentiality impact means sensitive operational data could be leaked, while the availability impact could cause downtime or degraded performance of monitoring systems. Given the critical role of monitoring in sectors such as finance, healthcare, energy, and government, exploitation could have cascading effects on service continuity and regulatory compliance. Furthermore, since the vulnerability can be exploited by low-privileged users without user interaction, insider threats or compromised accounts could be leveraged to escalate attacks. The complexity of the attack is high, which may limit widespread exploitation, but targeted attacks against high-value European organizations remain a concern.
Mitigation Recommendations
To mitigate CVE-2023-41791, European organizations should immediately upgrade Pandora FMS to a version where this vulnerability is patched once available. In the interim, organizations should implement strict input validation and output encoding on all user-supplied data, especially translation strings and configuration inputs. Restrict access to the Pandora FMS web interface to trusted networks and users, employing network segmentation and strong authentication mechanisms. Monitor logs for unusual activity indicative of XSS attempts or configuration file changes. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the web application context. Conduct regular security assessments and penetration testing focused on web application vulnerabilities. Additionally, educate administrators and users about the risks of XSS and the importance of using least privilege principles to minimize the impact of compromised accounts. Finally, maintain up-to-date backups of configuration files to enable rapid recovery in case of tampering.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- PandoraFMS
- Date Reserved
- 2023-09-01T11:54:47.539Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f06a8182aa0cae27ee91d
Added to database: 6/3/2025, 2:28:56 PM
Last enriched: 7/3/2025, 9:41:11 PM
Last updated: 8/9/2025, 3:44:02 PM
Views: 15
Related Threats
CVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumCVE-2025-9051: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-1929: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Risk Yazılım Teknolojileri Ltd. Şti. Reel Sektör Hazine ve Risk Yönetimi Yazılımı
HighCVE-2025-54475: CWE-89: Improper Neutralization of Special Elements used in an SQL Command in joomsky.com JS Jobs component for Joomla
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.