Bug ID 1224231
Summary VUL-0: CVE-2024-29894: cacti: residual cross-site scripting vulnerability caused by incomplete fix
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/405104/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee Andreas.Stieger@gmx.de
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC camila.matos@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

Cacti provides an operational monitoring and fault management framework.
Versions of Cacti prior to 1.2.27 contain a residual cross-site scripting
vulnerability caused by an incomplete fix for CVE-2023-50250.
`raise_message_javascript` from `lib/functions.php` now uses purify.js to fix
CVE-2023-50250 (among others). However, it still generates the code out of
unescaped PHP variables `$title` and `$header`. If those variables contain
single quotes, they can be used to inject JavaScript code. An attacker
exploiting this vulnerability could execute actions on behalf of other users.
This ability to impersonate users could lead to unauthorized changes to
settings. Version 1.2.27 fixes this issue.

References:
https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-29894
https://www.cve.org/CVERecord?id=CVE-2024-29894
https://github.com/Cacti/cacti/security/advisories/GHSA-grj5-8fcj-34gh


You are receiving this mail because: