Vulnerability Details : CVE-2019-11025
In clearFilter() in utilities.php in Cacti before 1.2.3, no escaping occurs before printing out the value of the SNMP community string (SNMP Options) in the View poller cache, leading to XSS.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2019-11025
Probability of exploitation activity in the next 30 days: 0.08%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 32 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2019-11025
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST |
CWE ids for CVE-2019-11025
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-11025
-
https://lists.debian.org/debian-lts-announce/2019/04/msg00017.html
[SECURITY] [DLA 1757-1] cacti security updateMailing List;Third Party Advisory
-
https://github.com/Cacti/cacti/compare/6ea486a...99995bb
Comparing 6ea486a...99995bb · Cacti/cacti · GitHubRelease Notes;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/03/msg00038.html
[SECURITY] [DLA 2965-1] cacti security updateMailing List;Third Party Advisory
-
https://github.com/Cacti/cacti/issues/2581
When viewing poller cache, Device SNMP community is not properly escaped · Issue #2581 · Cacti/cacti · GitHubExploit;Issue Tracking;Third Party Advisory
Products affected by CVE-2019-11025
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*