5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
25.9%
cacti is vulnerable to Open Redirect. An attacker could exploit this vulnerability by tricking a user into performing a password change via a malicious phishing link. Once the user clicks on the phishing link and changes their password, they will be redirected to a malicious website where the attacker could steal their credentials or install malware on their computer
github.com/Cacti/cacti/security/advisories/GHSA-4pjv-rmrp-r59x
lists.debian.org/debian-lts-announce/2024/03/msg00018.html
lists.fedoraproject.org/archives/list/[email protected]/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
lists.fedoraproject.org/archives/list/[email protected]/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
lists.fedoraproject.org/archives/list/[email protected]/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
security-tracker.debian.org/tracker/CVE-2023-39364
www.debian.org/security/2023/dsa-5550