CVE-2023-39360

Name
CVE-2023-39360
Description
Cacti is an open source operational monitoring and fault management framework.Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data. The vulnerability is found in `graphs_new.php`. Several validations are performed, but the `returnto` parameter is directly passed to `form_save_button`. In order to bypass this validation, returnto must contain `host.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/Cacti/cacti/security/advisories/GHSA-gx8c-xvjh-9qh4

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:cacti:cacti:1.2.24:*:*:*:*:*:*:* cacti == None == 1.2.24

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
cacti 3.18-community 1.2.24-r1 Jeff Bilyk <jbilyk@gmail.com> possibly vulnerable
cacti edge-community 1.2.25-r0 Jeff Bilyk <jbilyk@gmail.com> fixed