UBUNTU-CVE-2024-29894

Source
https://ubuntu.com/security/CVE-2024-29894
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-29894.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-29894
Related
Published
2024-05-14T15:17:00Z
Modified
2024-05-14T15:17:00Z
Summary
[none]
Details

Cacti provides an operational monitoring and fault management framework. Versions of Cacti prior to 1.2.27 contain a residual cross-site scripting vulnerability caused by an incomplete fix for CVE-2023-50250. raise_message_javascript from lib/functions.php now uses purify.js to fix CVE-2023-50250 (among others). However, it still generates the code out of unescaped PHP variables $title and $header. If those variables contain single quotes, they can be used to inject JavaScript code. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. Version 1.2.27 fixes this issue.

References

Affected packages

Ubuntu:24.04:LTS / cacti

Package

Name
cacti
Purl
pkg:deb/ubuntu/cacti?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.26+ds1-1ubuntu0.1

Affected versions

1.*

1.2.25+ds1-2
1.2.26+ds1-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1.2.26+ds1-1ubuntu0.1",
            "binary_name": "cacti"
        }
    ]
}