CVE-2024-29894

Improper Encoding or Escaping of Output (CWE-116)

Published: May 14, 2024 / Updated: 6mo ago

010
CVSS 5.4EPSS 0.04%Medium
CVE info copied to clipboard

Cacti provides an operational monitoring and fault management framework. Versions of Cacti prior to 1.2.27 contain a residual cross-site scripting vulnerability caused by an incomplete fix for CVE-2023-50250. `raise_message_javascript` from `lib/functions.php` now uses purify.js to fix CVE-2023-50250 (among others). However, it still generates the code out of unescaped PHP variables `$title` and `$header`. If those variables contain single quotes, they can be used to inject JavaScript code. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. Version 1.2.27 fixes this issue.

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

Timeline

First Article

Feedly found the first article mentioning CVE-2024-29894. See article

Apr 13, 2024 at 5:51 PM / Planet Debian
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Apr 14, 2024 at 7:48 AM
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

May 13, 2024 at 3:35 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 8.4%)

May 14, 2024 at 2:32 PM
CVE Assignment

NVD published the first details for CVE-2024-29894

May 14, 2024 at 3:17 PM
CVSS

A CVSS base score of 5.4 has been assigned.

May 14, 2024 at 3:23 PM / nvd
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (510854)

May 18, 2024 at 7:53 AM
Threat Intelligence Report

CVE-2024-29894 is a critical vulnerability that only affects Ubuntu 24.04 LTS. It is important to note that this vulnerability has the potential to be exploited in the wild, although there are currently no proof-of-concept exploits available. It is recommended to apply any patches or mitigations provided by the vendor to prevent any downstream impacts to other third party vendors or technology. See article

Aug 20, 2024 at 3:29 PM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (206445)

Sep 3, 2024 at 11:15 AM
Static CVE Timeline Graph

Affected Systems

Cacti/cacti
+null more

Attack Patterns

CAPEC-104: Cross Zone Scripting
+null more

References

Linux Kernel and Cacti updates for Ubuntu
remote attacker could possibly use this issue to perform SQL injection Several security issues were fixed in the kernel.

News

openSUSE 15 Security Update : cacti, cacti-spine (openSUSE-SU-2024:0276-1)
The remote openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2024:0276-1 advisory. * Improve PHP 8.1 support for Installer
opensuse openSUSE-SU-2024:0274-1: openSUSE 15 : Security update for cacti, cacti-spine (Important) (openSUSE-SU-2024:0274-1)
Development Last Updated: 9/3/2024 CVEs: CVE-2024-29894 , CVE-2024-34340 , CVE-2024-31460 , CVE-2024-31458 , CVE-2024-31445 , CVE-2024-25641 , CVE-2024-27082 , CVE-2024-31459 , CVE-2024-31444 , CVE-2024-31443
Cacti and Opera updates for SUSE
This update for cacti, cacti-spine fixes the following issues: This update for opera fixes the following issues:
openSUSE: 2024:0276-1 important: cacti, cacti-spine Advisory Security Update
Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP6: zypper in -t patch openSUSE-2024-276=1 Affected Products: openSUSE Backports SLE-15-SP6 .
openSUSE: 2024:0274-1 important: cacti, cacti-spine Advisory Security Update
Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2024-274=1 Affected Products: openSUSE Backports SLE-15-SP5 .
See 26 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:Required
Scope:Unchanged
Confidentiality:None
Integrity:Low
Availability Impact:Low

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI