Описание
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. It was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable. This issue has been fixed in Nautobot versions 1.6.20 and 2.2.3. There are no known workarounds for this vulnerability.
Ссылки
- Patch
- Patch
- Patch
- Third Party Advisory
- Patch
- Patch
- Patch
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 1.5.0 (включая) до 1.6.20 (исключая)Версия от 2.0.0 (включая) до 2.2.3 (исключая)
Одно из
cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*
cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*
EPSS
Процентиль: 42%
0.00201
Низкий
7.5 High
CVSS3
6.1 Medium
CVSS3
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 7.5
github
почти 2 года назад
nautobot has reflected Cross-site Scripting potential in all object list views
EPSS
Процентиль: 42%
0.00201
Низкий
7.5 High
CVSS3
6.1 Medium
CVSS3
Дефекты
CWE-79