Vendor: Cacti
Product: Cacti
Vulnerable version: 1.2.26 and lower
Vulnerability type:
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Identifier (ID):
Vulnerability vector:
- Base vulnerability score (CVSSv3.1): CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Severity (CVSSv3.1): 5.4 (medium)
- Base Vulnerability score (CVSS v4.0): CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
- Severity (CVSS v4.0): 5.1 (medium)
Description:
The vulnerability was identified in Cacti version 1.2.26 and below. It allows to bypass an earlier patch (CVE-2023-39360). The vulnerability leads to a cross-site scripting attack (XSS DOM-based). The vulnerability can be exploited by an authorized user and leads to the possibility of executing arbitrary javascript code in the browser of the attacked user.
Vulnerability status: Confirmed by vendor
Date of vulnerability detection: 08.11.2023
Recommendations: Update to version 1.2.27 or higher
Additional information: Security Advisory
Researcher: Aleksey Solovev (Positive Technologies)
Get in touch
will contact you shortly