Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-50250

Опубликовано: 22 дек. 2023
Источник: debian

Описание

Cacti is an open source operational monitoring and fault management framework. A reflection cross-site scripting vulnerability was discovered in version 1.2.25. Attackers can exploit this vulnerability to perform actions on behalf of other users. The vulnerability is found in `templates_import.php.` When uploading an xml template file, if the XML file does not pass the check, the server will give a JavaScript pop-up prompt, which contains unfiltered xml template file name, resulting in XSS. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. As of time of publication, no patched versions are available.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cactifixed1.2.26+ds1-1package
cactifixed1.2.24+ds1-1+deb12u2bookwormpackage
cactinot-affectedbullseyepackage
cactinot-affectedbusterpackage

Примечания

  • https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73

  • https://github.com/Cacti/cacti/commit/58a980f335980ab57659420053d89d4e721ae3fc (release/1.2.26)

  • https://github.com/Cacti/cacti/commit/73d9a60e24d6d826e6343b94d833b48c28b68643 (release/1.2.26)

  • https://github.com/Cacti/cacti/commit/59e39b34f8f1d80b28d38a391d7aa6e7a3302f5b (release/1.2.26)

  • Introduced by: https://github.com/Cacti/cacti/commit/27a36d48e1cea172b0750c970324208b39d2bec5 (release/1.2.23)

  • Incomplete fix see CVE-2024-29894

Связанные уязвимости

CVSS3: 5.4
ubuntu
около 2 лет назад

Cacti is an open source operational monitoring and fault management framework. A reflection cross-site scripting vulnerability was discovered in version 1.2.25. Attackers can exploit this vulnerability to perform actions on behalf of other users. The vulnerability is found in `templates_import.php.` When uploading an xml template file, if the XML file does not pass the check, the server will give a JavaScript pop-up prompt, which contains unfiltered xml template file name, resulting in XSS. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. As of time of publication, no patched versions are available.

CVSS3: 5.4
nvd
около 2 лет назад

Cacti is an open source operational monitoring and fault management framework. A reflection cross-site scripting vulnerability was discovered in version 1.2.25. Attackers can exploit this vulnerability to perform actions on behalf of other users. The vulnerability is found in `templates_import.php.` When uploading an xml template file, if the XML file does not pass the check, the server will give a JavaScript pop-up prompt, which contains unfiltered xml template file name, resulting in XSS. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. As of time of publication, no patched versions are available.

CVSS3: 5.4
fstec
около 2 лет назад

Уязвимость сценария templates_import.php программного средства мониторинга сети Cacti, позволяющая нарушителю проводить межсайтовые сценарные атаки и получить несанкционированный доступ на чтение, изменение или удаление данных

suse-cvrf
около 2 лет назад

Security update for cacti, cacti-spine