cve/2023/CVE-2023-49086.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-49086](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49086)
![](https://img.shields.io/static/v1?label=Product&message=cacti&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%201.2.25%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). Bypassing an earlier fix (CVE-2023-39360) that leads to a DOM XSS attack.Exploitation of the vulnerability is possible for an authorized user. The vulnerable component isthe `graphs_new.php`. Impact of the vulnerability - execution of arbitrary javascript code inthe attacked user's browser. This issue has been patched in version 1.2.26.
### POC
#### Reference
- https://github.com/Cacti/cacti/security/advisories/GHSA-wc73-r2vw-59pr
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/NaInSec/CVE-LIST
2024-05-25 21:48:12 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds