Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash Monit before 5.25.3 allows a remote unauthenticated attacker to introduce arbitrary JavaScript via manipulation of an unsanitized user field of the Authorization header for HTTP Basic Authentication, which is mishandled during an _viewlog operation.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "18.10"
}
]
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "19.04"
}
]
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.0"
}
]
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "31"
}
]
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "32"
}
]
}
]
}{
"cpe": "cpe:2.3:a:mmonit:monit:*:*:*:*:*:*:*:*",
"source": [
"CPE_FIELD",
"REFERENCES"
],
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "5.25.3"
}
]
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-11454.json"
"2026-04-11T21:43:51Z"
[
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"192760338526727209623324117128154017375",
"176363103172019343482822146618895062539",
"268951090696583617304681140437510744709",
"59623480104490707459496006942355571950"
],
"threshold": 0.9
},
"target": {
"file": "src/http/cervlet.c"
},
"source": "https://bitbucket.org/tildeslash/monit@328f60773057641c4b2075fab9820145e95b728c",
"signature_version": "v1",
"id": "CVE-2019-11454-0dc3f653"
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"function_hash": "23861697072258711609888231435936520561",
"length": 648.0
},
"target": {
"file": "src/http/cervlet.c",
"function": "do_foot"
},
"source": "https://bitbucket.org/tildeslash/monit@e9e458ae169c1155cdcd9ca956c0cb4b8d5614f9",
"signature_version": "v1",
"id": "CVE-2019-11454-13a9ad76"
},
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"335804617024891229671540928535154829375",
"310100624601859608845471492265078988370",
"154807492576191686414917484984983555220",
"87379780001120515149930474484174954645"
],
"threshold": 0.9
},
"target": {
"file": "src/monit.c"
},
"source": "https://bitbucket.org/tildeslash/monit@e9e458ae169c1155cdcd9ca956c0cb4b8d5614f9",
"signature_version": "v1",
"id": "CVE-2019-11454-16367172"
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"function_hash": "287019773174119488372765190948736526793",
"length": 598.0
},
"target": {
"file": "src/monit.c",
"function": "version"
},
"source": "https://bitbucket.org/tildeslash/monit@e9e458ae169c1155cdcd9ca956c0cb4b8d5614f9",
"signature_version": "v1",
"id": "CVE-2019-11454-4c95ae77"
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"function_hash": "309952375732884078430535276969002257337",
"length": 1433.0
},
"target": {
"file": "src/http/cervlet.c",
"function": "do_about"
},
"source": "https://bitbucket.org/tildeslash/monit@e9e458ae169c1155cdcd9ca956c0cb4b8d5614f9",
"signature_version": "v1",
"id": "CVE-2019-11454-79ed33e1"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"83469158976872561554671678004370611577",
"231063324253302383638823170907697343759",
"266168777303464530820275752220424199435",
"234939084648347694763319377839068928997",
"271084292119558296088722602634243413305",
"72830479874841803587946559619711045487"
],
"threshold": 0.9
},
"target": {
"file": "src/http/cervlet.c"
},
"source": "https://bitbucket.org/tildeslash/monit@e9e458ae169c1155cdcd9ca956c0cb4b8d5614f9",
"signature_version": "v1",
"id": "CVE-2019-11454-9093b3ec"
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"function_hash": "316469937887899855624336538781855417458",
"length": 1120.0
},
"target": {
"file": "src/http/cervlet.c",
"function": "do_viewlog"
},
"source": "https://bitbucket.org/tildeslash/monit@328f60773057641c4b2075fab9820145e95b728c",
"signature_version": "v1",
"id": "CVE-2019-11454-a558f63e"
}
]