CVE-2023-39364Open Redirect in Cacti

CWE-601Open Redirect3 documents3 sources
Severity
5.4MEDIUMNVD
EPSS
0.2%
top 62.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 5

Description

Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, users with console access can be redirected to an arbitrary website after a change password performed via a specifically crafted URL. The `auth_changepassword.php` file accepts `ref` as a URL parameter and reflects it in the form used to perform the change password. It's value is used to perform a redirect via `header` PHP function. A user can be tricked in performing the change password operation, e.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages4 packages

CVEListV5cacti/cacti< 1.2.25
debiandebian/cacti< cacti 1.2.24+ds1-1+deb12u1 (bookworm)
Debiancacti/cacti< 1.2.16+ds1-2+deb11u2+3
NVDcacti/cacti1.2.24

Also affects: Fedora 37, 38

🔴Vulnerability Details

1
OSV
CVE-2023-39364: Cacti is an open source operational monitoring and fault management framework2023-09-05

📋Vendor Advisories

1
Debian
CVE-2023-39364: cacti - Cacti is an open source operational monitoring and fault management framework. I...2023