CVE-2018-20723: Multiple Vulnerabilities discovered in the package Cacti

Multiple Vulnerabilities discovered in the package Cacti

Loginsoft-2019-1036
February 11, 2019

CVE Number

CVE – CVE-2018-20723

CWE Number

CWE – 79

Product Details

Cacti is an open source network graphing solution designed to harness the power of RRD Tool’s data storage and graphing functionality.
URL: https://www.cacti.net/

Vulnerable Versions

v1.1.38

Vulnerability Details

Before printing the `Name` value on the color ‘Template’ page, there is no escape being done, leaving the application vulnerable to the specific XSS attack.
Reference link: https://github.com/Cacti/cacti/issues/2215

Mitigations
  • Avoid inserting or adding the untrusted input data
  • Always perform the sanitation of the input data like HTML escape, Attribute escape, JavaScript escape JSON parsing and HTML encoding before inserting them into the page content
  • It is advisable to practice content security policy and adopt the auto escaping template system
  • Implement the X-XSS-Protection response header
Timeline

Vendor Disclosure: 2018-12-15
Public Disclosure: 2019-02-11

CVE Number

CVE – CVE-2018-20725

Vulnerability Details

Before printing the `Vertical Table` value on the ‘Graphic Template page, there is no escape being done, leaving the application vulnerable to the specific XSS attack.
Reference link: https://github.com/Cacti/cacti/issues/2214

Mitigations
  • Avoid inserting or adding the untrusted input data
  • Always perform the sanitation of the input data like HTML escape, Attribute escape, JavaScript escape JSON parsing and HTML encoding before inserting them into the page content
  • It is advisable to practice content security policy and adopt the auto escaping template system
  • Implement the X-XSS-Protection response header
Timeline

Vendor Disclosure: 2018-12-15
Public Disclosure: 2019-02-11

CVE Number

CVE – CVE-2018-20726

Vulnerability Details

Before printing the `Hostname` value on the ‘Tree’  table, there is no escape being done, leaving the application vulnerable to the specific XSS attack.
Reference link: https://github.com/Cacti/cacti/issues/2213

Mitigations
  • Avoid inserting or adding the untrusted input data
  • Always perform the sanitation of the input data like HTML escape, Attribute escape, JavaScript escape JSON parsing and HTML encoding before inserting them into the page content
  • It is advisable to practice content security policy and adopt the auto escaping template system
  • Implement the X-XSS-Protection response header
Timeline

Vendor Disclosure: 2018-12-16
Public Disclosure: 2019-02-11

CVE Number

CVE – CVE-2018-20724

Vulnerability Details

Before printing the `Hostname` value on the ‘Data collectors table’, there is no escape being done, leaving the application vulnerable to the specific XSS attack.

Reference link: https://github.com/Cacti/cacti/issues/2212

Mitigations
  • Avoid inserting or adding the untrusted input data
  • Always perform the sanitation of the input data like HTML escape, Attribute escape, JavaScript escape JSON parsing and HTML encoding before inserting them into the page content
  • It is advisable to practice content security policy and adopt the auto escaping template system
  • Implement the X-XSS-Protection response header
Timeline

Vendor Disclosure: 2018-12-15
Public Disclosure: 2019-02-11
Patch: https://github.com/Cacti/cacti/commit/80c2a88fb2afb93f87703ba4641f9970478c102d

Credit

Discovered by ACE Team – Loginsoft