First published: Tue Sep 05 2023(Updated: )
Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, users with console access can be redirected to an arbitrary website after a change password performed via a specifically crafted URL. The `auth_changepassword.php` file accepts `ref` as a URL parameter and reflects it in the form used to perform the change password. It's value is used to perform a redirect via `header` PHP function. A user can be tricked in performing the change password operation, e.g., via a phishing message, and then interacting with the malicious website where the redirection has been performed, e.g., downloading malwares, providing credentials, etc. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | =1.2.24 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
debian/cacti | <=1.2.2+ds1-2+deb10u4<=1.2.2+ds1-2+deb10u5<=1.2.16+ds1-2+deb11u1<=1.2.24+ds1-1 | 1.2.16+ds1-2+deb11u2 1.2.24+ds1-1+deb12u1 1.2.25+ds1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39364 is a vulnerability in Cacti 1.2.24 that allows users with console access to be redirected to an arbitrary website after a change password is performed via a specifically crafted URL.
CVE-2023-39364 affects Cacti 1.2.24, allowing users with console access to be redirected to an arbitrary website after changing their password with a specially crafted URL.
CVE-2023-39364 has a severity keyword of 'medium' and a severity value of 5.4.
To fix CVE-2023-39364, update your Cacti installation to version 1.2.25 or later, which includes a patch for this vulnerability.
More information about CVE-2023-39364 can be found on the GitHub security advisory page: [https://github.com/Cacti/cacti/security/advisories/GHSA-4pjv-rmrp-r59x](https://github.com/Cacti/cacti/security/advisories/GHSA-4pjv-rmrp-r59x)