CVE-2024-43365

NameCVE-2024-43365
DescriptionCacti is an open source performance and fault management framework. The`consolenewsection` parameter is not properly sanitized when saving external links in links.php . Morever, the said consolenewsection parameter is stored in the database and reflected back to user in `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the “consolenewsection” parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cacti (PTS)jessie, jessie (lts)0.8.8b+dfsg-8+deb8u10vulnerable
stretch (security), stretch (lts), stretch0.8.8h+ds1-10+deb9u2vulnerable
buster (security), buster, buster (lts)1.2.2+ds1-2+deb10u6vulnerable
bullseye1.2.16+ds1-2+deb11u3vulnerable
bullseye (security)1.2.16+ds1-2+deb11u4vulnerable
bookworm1.2.24+ds1-1+deb12u4vulnerable
bookworm (security)1.2.24+ds1-1+deb12u2vulnerable
sid, trixie1.2.28+ds1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cactisourcejessie(unfixed)end-of-life
cactisourcestretch(unfixed)end-of-life
cactisourcebuster(unfixed)end-of-life
cactisource(unstable)1.2.28+ds1-1

Notes

https://github.com/Cacti/cacti/security/advisories/GHSA-49f2-hwx9-qffr

Search for package or bug name: Reporting problems