CVE-2024-43362Cross-site Scripting in Cacti

Severity
5.4MEDIUMNVD
CNA7.3
EPSS
5.5%
top 9.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 7
Latest updateNov 5

Description

Cacti is an open source performance and fault management framework. The `fileurl` parameter is not properly sanitized when saving external links in `links.php` . Morever, the said fileurl is placed in some html code which is passed to the `print` function in `link.php` and `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the `fileurl` parameter in the http post request while creating external links to perform stored XSS attacks. The vul

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages4 packages

CVEListV5cacti/cacti< 1.2.28
NVDcacti/cacti< 1.2.28
debiandebian/cacti< cacti 1.2.24+ds1-1+deb12u5 (bookworm)
Debiancacti/cacti< 1.2.16+ds1-2+deb11u5+3

🔴Vulnerability Details

2
CVEList
Stored Cross-site Scripting (XSS) when creating external links in Cacti2024-10-07
OSV
CVE-2024-43362: Cacti is an open source performance and fault management framework2024-10-07

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Cacti links.php Multiple Parameters Cross Site Scripting Attempt (CVE-2024-43362, CVE-2024-43364)2025-11-05

📋Vendor Advisories

1
Debian
CVE-2024-43362: cacti - Cacti is an open source performance and fault management framework. The `fileurl...2024