Vulnerability Details : CVE-2020-7106
Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string from the database that is displayed by $header to trigger the XSS).
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2020-7106
Probability of exploitation activity in the next 30 days: 1.57%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 86 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2020-7106
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
nvd@nist.gov |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
nvd@nist.gov |
CWE ids for CVE-2020-7106
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-7106
-
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html
[security-announce] openSUSE-SU-2020:0284-1: important: Security updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html
[security-announce] openSUSE-SU-2020:0558-1: important: Security updateMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/01/msg00014.html
[SECURITY] [DLA 2069-1] cacti security updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html
[security-announce] openSUSE-SU-2020:0565-1: important: Security updateMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/
[SECURITY] Fedora 30 Update: cacti-spine-1.2.9-1.fc30 - package-announce - Fedora Mailing-ListsMailing List;Patch;Third Party Advisory
-
https://github.com/Cacti/cacti/issues/3191
Vulnerability report: Lack of escaping on some pages can lead to XSS exposure · Issue #3191 · Cacti/cacti · GitHubExploit;Third Party Advisory
-
https://security.gentoo.org/glsa/202003-40
Cacti: Multiple vulnerabilities (GLSA 202003-40) — Gentoo securityThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/
[SECURITY] Fedora 31 Update: cacti-spine-1.2.9-1.fc31 - package-announce - Fedora Mailing-ListsMailing List;Patch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html
[security-announce] openSUSE-SU-2020:0272-1: important: Security updateMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/03/msg00038.html
[SECURITY] [DLA 2965-1] cacti security updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00032.html
[security-announce] openSUSE-SU-2020:0654-1: moderate: Security update for cacti, cacti-spine - openSUSE Security Announce - openSUSE Mailing ListsMailing List;Third Party Advisory
Products affected by CVE-2020-7106
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
- cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*