Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-39360

Опубликовано: 05 сент. 2023
Источник: debian

Описание

Cacti is an open source operational monitoring and fault management framework.Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data. The vulnerability is found in `graphs_new.php`. Several validations are performed, but the `returnto` parameter is directly passed to `form_save_button`. In order to bypass this validation, returnto must contain `host.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cactifixed1.2.25+ds1-1package

Примечания

  • https://github.com/Cacti/cacti/security/advisories/GHSA-gx8c-xvjh-9qh4

  • Initial fix: https://github.com/cacti/cacti/commit/9696bbd8060c7332b11b709f4dd17e6c3776bba2 (release/1.2.25)

  • Final fix: https://github.com/cacti/cacti/commit/bc6dc996745ef0dee3427178c8d87a6402f3fefa (release/1.2.25)

  • PoC doesn't seem to trigger without https://github.com/Cacti/cacti/commit/137340264ac550d060ef17c4d0794fa4abae1c26 (release/1.2.23)

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 2 лет назад

Cacti is an open source operational monitoring and fault management framework.Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data. The vulnerability is found in `graphs_new.php`. Several validations are performed, but the `returnto` parameter is directly passed to `form_save_button`. In order to bypass this validation, returnto must contain `host.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.

CVSS3: 6.1
nvd
больше 2 лет назад

Cacti is an open source operational monitoring and fault management framework.Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data. The vulnerability is found in `graphs_new.php`. Several validations are performed, but the `returnto` parameter is directly passed to `form_save_button`. In order to bypass this validation, returnto must contain `host.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.

CVSS3: 6.1
fstec
больше 2 лет назад

Уязвимость сценария graphs_new.php программного средства мониторинга сети Cacti, позволяющая нарушителю проводить межсайтовые сценарные атаки

suse-cvrf
больше 2 лет назад

Security update for cacti, cacti-spine