7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
6.8 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.7%
It was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable, including:
as well as any similar object-list views provided by any Nautobot App.
Fixed in Nautobot 1.6.20 and 2.2.3.
No workaround has been identified
Credit to Michael Panorios for reporting this issue.
github.com/nautobot/nautobot
github.com/nautobot/nautobot/commit/2ea5797ea43646d5d8b29433e4c707b5a9758146
github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e
github.com/nautobot/nautobot/pull/5646
github.com/nautobot/nautobot/pull/5647
github.com/nautobot/nautobot/releases/tag/v1.6.20
github.com/nautobot/nautobot/releases/tag/v2.2.3
github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg
nvd.nist.gov/vuln/detail/CVE-2024-32979
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
6.8 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.7%