CVE-2023-49088Cross-site Scripting in Cacti

3 documents3 sources
Severity
4.8MEDIUMNVD
EPSS
1.0%
top 22.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 22

Description

Cacti is an open source operational monitoring and fault management framework. The fix applied for CVE-2023-39515 in version 1.2.25 is incomplete as it enables an adversary to have a victim browser execute malicious code when a victim user hovers their mouse over the malicious data source path in `data_debug.php`. To perform the cross-site scripting attack, the adversary needs to be an authorized cacti user with the following permissions: `General Administration>Sites/Devices/Data`. The victim o

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:NExploitability: 1.7 | Impact: 2.7

Affected Packages3 packages

NVDcacti/cacti< 1.2.25
debiandebian/cacti< cacti 1.2.24+ds1-1+deb12u2 (bookworm)
Debiancacti/cacti< 1.2.16+ds1-2+deb11u3+3

🔴Vulnerability Details

1
OSV
CVE-2023-49088: Cacti is an open source operational monitoring and fault management framework2023-12-22

📋Vendor Advisories

1
Debian
CVE-2023-49088: cacti - Cacti is an open source operational monitoring and fault management framework. T...2023