First published: Thu Jan 16 2020(Updated: )
Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string from the database that is displayed by $header to trigger the XSS).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | <1.2.9 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 | |
Suse Package Hub | ||
SUSE Linux Enterprise | =12.0 | |
Fedoraproject Extra Packages For Enterprise Linux | =7.0 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Extra Packages For Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7106 is a stored Cross-Site Scripting (XSS) vulnerability in Cacti 1.2.8.
CVE-2020-7106 affects the following files: data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php.
CVE-2020-7106 has a severity rating of 6.1, which is considered medium.
To fix CVE-2020-7106, you should update Cacti to version 1.2.9 or apply the necessary patches provided by the vendor.
You can find more information about CVE-2020-7106 at the following references: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html), [Reference 2](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html), [Reference 3](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html).