CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-31443

Medium Severity
Cacti
SVRS
30/100

CVSSv3
5.7/10

EPSS
0.00333/1

CVE-2024-31443 in Cacti allows for cross-site scripting (XSS) due to insufficient data validation in the form_save() function of data_queries.php. This vulnerability arises because unsanitized data is used to construct HTML in the grow_right_pane_tree() function, potentially enabling attackers to inject malicious scripts into web pages viewed by users. Despite a CVSS score of 5.7, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a lower immediate threat level. However, the XSS vulnerability can still be exploited to steal cookies, redirect users to malicious sites, or deface websites. Users of Cacti should update to version 1.2.27 or later to mitigate this security risk. The fix involves proper sanitization to prevent the injection of arbitrary HTML code. While not immediately critical based on the SVRS, proactive patching is recommended to prevent potential exploitation.

In The Wild
X_refsource_CONFIRM
X_refsource_MISC
CVSS:3.1
AV:N
AC:L
PR:L
UI:R
S:U
C:N
I:N
A:H
2024-05-13

2025-02-13

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-31443 | Cacti up to 1.2.26 data_queries.php grow_right_pane_tree cross site scripting
vuldb.com2025-03-30
CVE-2024-31443 | Cacti up to 1.2.26 data_queries.php grow_right_pane_tree cross site scripting | A vulnerability classified as problematic has been found in Cacti up to 1.2.26. This affects the function grow_right_pane_tree in the library lib/html.php of the file data_queries.php. The manipulation leads to cross site scripting. This vulnerability is uniquely identified as <a href="https://vuldb.com
vuldb.com
rss
forum
news
Vulnerability Summary for the Week of May 13, 2024
CISA2024-05-20
2dc682d0fcad713a96cc38477d6 which was released along with the extension version `0.35`. As a workaround, Chrome users can use the Extensions Settings to disable the extension access to only the origins that you want. Firefox doesn't have an alternative to upgrading to a fixed version. 2024-05-14 7.6 CVE-2024-34714
cisa.gov
rss
forum
news

Social Media

CVE-2024-31443 Cacti provides an operational monitoring and fault management framework. Prior to 1.2.27, some of the data stored in `form_save()` function in `data_queries.php` is n… https://t.co/RuC8tPZBus
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppCacticacti
Configuration 2
TypeVendorProduct
OSFedoraprojectfedora

References

ReferenceLink
[email protected]https://github.com/Cacti/cacti/commit/f946fa537d19678f938ddbd784a10e3290d275cf
[email protected]https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3
[email protected]https://github.com/Cacti/cacti/commit/f946fa537d19678f938ddbd784a10e3290d275cf
[email protected]https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/
AF854A3A-2127-422B-91AE-364DA2661108https://github.com/Cacti/cacti/commit/f946fa537d19678f938ddbd784a10e3290d275cf
AF854A3A-2127-422B-91AE-364DA2661108https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3
AF854A3A-2127-422B-91AE-364DA2661108https://lists.fedoraproject.org/archives/list/[email protected]/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/
[email protected]https://github.com/Cacti/cacti/commit/f946fa537d19678f938ddbd784a10e3290d275cf
[email protected]https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/
HTTPS://GITHUB.COM/CACTI/CACTI/COMMIT/F946FA537D19678F938DDBD784A10E3290D275CFhttps://github.com/Cacti/cacti/commit/f946fa537d19678f938ddbd784a10e3290d275cf
HTTPS://GITHUB.COM/CACTI/CACTI/SECURITY/ADVISORIES/GHSA-RQC8-78CM-85J3https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3
GITHUBhttps://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3

CWE Details

CWE IDCWE NameDescription
CWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence