First published: Wed Jan 19 2022(Updated: )
As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | =0.8.7g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-26247.
To exploit this vulnerability, you can visit the URL "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" as an unauthenticated remote user.
The severity of CVE-2021-26247 is medium with a CVSS score of 6.1.
Cacti version 0.8.7g is affected by CVE-2021-26247.
To fix CVE-2021-26247, you should update Cacti to a version that is not affected by the vulnerability.