CVE-2024-29894

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-29894
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-29894.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-29894
Aliases
Related
Published
2024-05-14T15:17:14Z
Modified
2024-09-18T03:26:51.648119Z
Summary
[none]
Details

Cacti provides an operational monitoring and fault management framework. Versions of Cacti prior to 1.2.27 contain a residual cross-site scripting vulnerability caused by an incomplete fix for CVE-2023-50250. raise_message_javascript from lib/functions.php now uses purify.js to fix CVE-2023-50250 (among others). However, it still generates the code out of unescaped PHP variables $title and $header. If those variables contain single quotes, they can be used to inject JavaScript code. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. Version 1.2.27 fixes this issue.

References

Affected packages

Debian:12 / cacti

Package

Name
cacti
Purl
pkg:deb/debian/cacti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.24+ds1-1+deb12u3

Affected versions

1.*

1.2.24+ds1-1
1.2.24+ds1-1+deb12u1
1.2.24+ds1-1+deb12u2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / cacti

Package

Name
cacti
Purl
pkg:deb/debian/cacti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.27+ds1-1

Affected versions

1.*

1.2.24+ds1-1
1.2.25+ds1-1
1.2.25+ds1-2
1.2.26+ds1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}