CVE-2024-30268

NameCVE-2024-30268
DescriptionCacti provides an operational monitoring and fault management framework. A reflected cross-site scripting vulnerability on the 1.3.x DEV branch allows attackers to obtain cookies of administrator and other users and fake their login using obtained cookies. This issue is fixed in commit a38b9046e9772612fda847b46308f9391a49891e.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cacti (PTS)jessie, jessie (lts)0.8.8b+dfsg-8+deb8u10fixed
stretch (security), stretch (lts), stretch0.8.8h+ds1-10+deb9u2fixed
buster (security), buster, buster (lts)1.2.2+ds1-2+deb10u6fixed
bullseye1.2.16+ds1-2+deb11u3fixed
bullseye (security)1.2.16+ds1-2+deb11u4fixed
bookworm1.2.24+ds1-1+deb12u4fixed
bookworm (security)1.2.24+ds1-1+deb12u2fixed
sid, trixie1.2.28+ds1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cactisource(unstable)(not affected)

Notes

- cacti <not-affected> (Vulnerable code not present in 1.2, only affects 1.3)
https://github.com/Cacti/cacti/security/advisories/GHSA-9m3v-whmr-pc2q
https://github.com/Cacti/cacti/commit/a38b9046e9772612fda847b46308f9391a49891e

Search for package or bug name: Reporting problems