Bug 1194860 (CVE-2021-3816) - VUL-0: CVE-2021-3816: cacti: arbitrary HTML inject in the group_prefix field
Summary: VUL-0: CVE-2021-3816: cacti: arbitrary HTML inject in the group_prefix field
Status: RESOLVED FIXED
Alias: CVE-2021-3816
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.3
Hardware: Other Other
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: Andreas Stieger
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/321021/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-01-19 08:37 UTC by Thomas Leroy
Modified: 2022-01-19 08:50 UTC (History)
0 users

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Leroy 2022-01-19 08:37:28 UTC
rh#2042284

Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary HTML in the group_prefix field during the creation of a new group via "Copy" method at user_group_admin.php.

Upstream fix commit:
https://github.com/Cacti/cacti/commit/2b8097c06030ab72c5b3bdadb23dceb5332f0e94

References:
https://www.cacti.net/info/changelog
https://github.com/Cacti/cacti/issues/1882
https://bugzilla.redhat.com/show_bug.cgi?id=2042284
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3816
Comment 1 Thomas Leroy 2022-01-19 08:50:09 UTC
The fixing commit was introduced in version 1.2.0, and our maintained codestreams are all more recent than this version (Factory, Backports, and Leap 15.3), therefore we are not affected.