Cross-site Scripting (XSS) - Stored in cacti/cacti
Valid
Reported on
Jan 1st 2022
Description
Hi there cacti maintainer team, I would like to report a stored XSS in cacti source code. It is due to unsanitized error message in synchronizing aggregates for color.
Proof of Concept
- Install a cacti instance in your local
- Go to Color and create a color with name
<img src=a onerror=alert(document.cookie)>
- Back to color list, click on a color and select action
Sync Aggregates
, then click Continue - See that an XSS is triggered and a pop up appears with your session cookie in it.
Impact
This vulnerability is capable of stored XSS.
We are processing your report and will contact the
cacti
team within 24 hours.
a year ago
We have contacted a member of the
cacti
team and are waiting to hear back
a year ago
A cacti/cacti maintainer
commented
a year ago
Master branch is not really used, but I have tested this against the 1.2.X branch and it is valid.
A cacti/cacti maintainer
commented
a year ago
Resolved in https://github.com/Cacti/cacti/commit/0c05f65273af61f444e216974f396210720e1135 input is now sanitized
to join this conversation