PatchSiren cyber security CVE debrief
CVE-2017-6393 Nagvis CVE debrief
CVE-2017-6393 is a cross-site scripting issue in NagVis 1.9b12. The supplied NVD record says insufficient filtration of user-supplied data passed to the "nagvis-master/share/userfiles/gadgets/std_table.php" URL can let an attacker execute arbitrary HTML and script code in a browser in the context of the vulnerable website. NVD classifies the issue as CWE-79 and rates it CVSS 6.1 (medium), with network attackability but user interaction required.
- Vendor
- Nagvis
- Product
- CVE-2017-6393
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-02
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-02
- Advisory updated
- 2026-05-13
Who should care
NagVis administrators and operators, especially anyone running version 1.9b12 or exposing the NagVis web interface to trusted users, should treat this as a real browser-side injection risk.
Technical summary
The official record identifies CWE-79 (cross-site scripting) affecting NagVis 1.9b12. The vulnerable path is the std_table.php gadget endpoint under nagvis-master/share/userfiles/gadgets/. The CVSS vector in NVD is AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating remote reachability, no privileges required, but user interaction needed and scope change possible.
Defensive priority
Medium. The issue is remotely reachable and can affect browser content and session context, but it requires user interaction and is not rated as availability-impacting. Prioritize it if the NagVis UI is accessible to many users or reachable over the network.
Recommended defensive actions
- Apply the vendor fix or update referenced by the NagVis issue 91 advisory in the supplied references.
- Restrict access to the NagVis web interface until the affected version is remediated.
- Review the std_table.php input and output handling to ensure untrusted data is properly validated and encoded before rendering.
- Confirm the deployment is not still running NagVis 1.9b12, which is the vulnerable version named in the NVD record.
Evidence notes
This debrief is based on the supplied official CVE/NVD material only. The CVE was published on 2017-03-02 and the NVD record was last modified on 2026-05-13. The NVD metadata names NagVis 1.9b12 as vulnerable, classifies the weakness as CWE-79, assigns CVSS 3.0 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, and cites the GitHub issue 91 reference as a patch/vendor advisory source. A SecurityFocus BID 96537 reference is also listed, but it is treated here as a secondary reference.
Official resources
-
CVE-2017-6393 CVE record
CVE.org
-
CVE-2017-6393 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
Publicly disclosed on 2017-03-02; this debrief uses the CVE publication date and the latest NVD modified timestamp from the supplied record.