First published: Tue Sep 05 2023(Updated: )
Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The `data_sources.php` script displays the data source management information (e.g. data source path, polling configuration etc.) for different data visualizations of the _cacti_ app. CENSUS found that an adversary that is able to configure a malicious Device name, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http://<HOST>/cacti/host.php`, while the rendered malicious payload is exhibited at `http://<HOST>/cacti/data_sources.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | >=1.2.0<1.2.25 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
debian/cacti | <=1.2.2+ds1-2+deb10u4<=1.2.2+ds1-2+deb10u5<=1.2.24+ds1-1 | 1.2.16+ds1-2+deb11u1 1.2.16+ds1-2+deb11u2 1.2.24+ds1-1+deb12u1 1.2.25+ds1-2 |
Ivanti Endpoint Management | =2022 Service Update 5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-39366 refers to a Stored Cross-Site-Scripting (XSS) vulnerability in Cacti, an open source operational monitoring and fault management framework.
CVE-2023-39366 allows an authenticated user to inject malicious code into the Cacti database, which can be viewed by administrative Cacti accounts.
CVE-2023-39366 has a severity rating of medium, with a CVSS score of 4.8.
To fix CVE-2023-39366, upgrade Cacti to version 1.2.25 or later.
You can find more information about CVE-2023-39366 in the Cacti GitHub Security Advisory: [GitHub Advisory](https://github.com/Cacti/cacti/security/advisories/GHSA-rwhh-xxm6-vcrv)