Description
Cacti provides an operational monitoring and fault management framework. A reflected cross-site scripting vulnerability on the 1.3.x DEV branch allows attackers to obtain cookies of administrator and other users and fake their login using obtained cookies. This issue is fixed in commit a38b9046e9772612fda847b46308f9391a49891e.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/Cacti/cacti/security/advisories/GHSA-9m3v-whmr-pc2q
Patch x_refsource_misc
https://github.com/Cacti/cacti/commit/a38b9046e9772612fda847b46308f9391a49891e
Various Sources x_refsource_misc
https://github.com/Cacti/cacti/blob/08497b8bcc6a6037f7b1aae303ad8f7dfaf7364e/settings.php#L66
Scores
CVSS v3
6.1
EPSS
0.0014
EPSS Percentile
34.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
Cacti/cacti
= 1.3.x DEV
Published
May 14, 2024
Tracked Since
Feb 18, 2026