Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-32979
HistoryMay 01, 2024 - 10:49 a.m.

CVE-2024-32979 Reflected Cross-site Scripting potential in all object list views in Nautobot

2024-05-0110:49:56
CWE-79
GitHub_M
www.cve.org
1
cve-2024-32979
nautobot
cross-site scripting
django
postgresql
mysql
vulnerability
web application
security patch

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L

0.0004 Low

EPSS

Percentile

15.7%

Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. It was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable. This issue has been fixed in Nautobot versions 1.6.20 and 2.2.3. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "nautobot",
    "product": "nautobot",
    "versions": [
      {
        "version": "< 1.6.20",
        "status": "affected"
      },
      {
        "version": ">= 2.0.0, < 2.2.3",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L

0.0004 Low

EPSS

Percentile

15.7%

Related for CVELIST:CVE-2024-32979