ghsa-jxgr-gcj5-cqqg
Vulnerability from github
Published
2024-05-01 09:36
Modified
2024-05-01 13:07
Summary
nautobot has reflected Cross-site Scripting potential in all object list views
Details

Impact

It was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable, including:

  • /dcim/location-types/
  • /dcim/locations/
  • /dcim/racks/
  • /dcim/rack-groups/
  • /dcim/rack-reservations/
  • /dcim/rack-elevations/
  • /tenancy/tenants/
  • /tenancy/tenant-groups/
  • /extras/tags/
  • /extras/statuses/
  • /extras/roles/
  • /extras/dynamic-groups/
  • /dcim/devices/
  • /dcim/platforms/
  • /dcim/virtual-chassis/
  • /dcim/device-redundancy-groups/
  • /dcim/interface-redundancy-groups/
  • /dcim/device-types/
  • /dcim/manufacturers/
  • /dcim/cables/
  • /dcim/console-connections/
  • /dcim/power-connections/
  • /dcim/interface-connections/
  • /dcim/interfaces/
  • /dcim/front-ports/
  • /dcim/rear-ports/
  • /dcim/console-ports/
  • /dcim/console-server-ports/
  • /dcim/power-ports/
  • /dcim/power-outlets/
  • /dcim/device-bays/
  • /dcim/inventory-items/
  • /ipam/ip-addresses/
  • /ipam/prefixes
  • /ipam/rirs/
  • /ipam/namespaces/
  • /ipam/vrfs/
  • /ipam/route-targets/
  • /ipam/vlans/
  • /ipam/vlan-groups/
  • /ipam/services/
  • /virtualization/virtual-machines/
  • /virtualization/interfaces/
  • /virtualization/clusters/
  • /virtualization/cluster-types/
  • /virtualization/cluster-groups/
  • /circuits/circuits/
  • /circuits/circuit-types/
  • /circuits/providers/
  • /circuits/provider-networks/
  • /dcim/power-feeds/
  • /dcim/power-panels/
  • /extras/secrets/
  • /extras/secrets-groups/
  • /extras/jobs/
  • /extras/jobs/scheduled-jobs/approval-queue/
  • /extras/jobs/scheduled-jobs/
  • /extras/job-results/
  • /extras/job-hooks/
  • /extras/job-buttons/
  • /extras/object-changes/
  • /extras/git-repositories/
  • /extras/graphql-queries/
  • /extras/relationships/
  • /extras/notes/
  • /extras/config-contexts/
  • /extras/config-context-schemas/
  • /extras/export-templates/
  • /extras/external-integrations/
  • /extras/webhooks/
  • /extras/computed-fields/
  • /extras/custom-fields/
  • /extras/custom-links/

as well as any similar object-list views provided by any Nautobot App.

Patches

Fixed in Nautobot 1.6.20 and 2.2.3.

Workarounds

No workaround has been identified

References

  • 5646

  • 5647

Credit to Michael Panorios for reporting this issue.

Show details on source website


{
  "affected": [
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "nautobot"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "1.5.0"
            },
            {
              "fixed": "1.6.20"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "nautobot"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "2.0.0"
            },
            {
              "fixed": "2.2.3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2024-32979"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-79"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2024-05-01T09:36:35Z",
    "nvd_published_at": "2024-05-01T11:15:47Z",
    "severity": "HIGH"
  },
  "details": "### Impact\n\nIt was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable, including:\n\n- /dcim/location-types/\n- /dcim/locations/\n- /dcim/racks/\n- /dcim/rack-groups/\n- /dcim/rack-reservations/\n- /dcim/rack-elevations/\n- /tenancy/tenants/\n- /tenancy/tenant-groups/\n- /extras/tags/\n- /extras/statuses/\n- /extras/roles/\n- /extras/dynamic-groups/\n- /dcim/devices/\n- /dcim/platforms/\n- /dcim/virtual-chassis/\n- /dcim/device-redundancy-groups/\n- /dcim/interface-redundancy-groups/\n- /dcim/device-types/\n- /dcim/manufacturers/\n- /dcim/cables/\n- /dcim/console-connections/\n- /dcim/power-connections/\n- /dcim/interface-connections/\n- /dcim/interfaces/\n- /dcim/front-ports/\n- /dcim/rear-ports/\n- /dcim/console-ports/\n- /dcim/console-server-ports/\n- /dcim/power-ports/\n- /dcim/power-outlets/\n- /dcim/device-bays/\n- /dcim/inventory-items/\n- /ipam/ip-addresses/\n- /ipam/prefixes\n- /ipam/rirs/\n- /ipam/namespaces/\n- /ipam/vrfs/\n- /ipam/route-targets/\n- /ipam/vlans/\n- /ipam/vlan-groups/\n- /ipam/services/\n- /virtualization/virtual-machines/\n- /virtualization/interfaces/\n- /virtualization/clusters/\n- /virtualization/cluster-types/\n- /virtualization/cluster-groups/\n- /circuits/circuits/\n- /circuits/circuit-types/\n- /circuits/providers/\n- /circuits/provider-networks/\n- /dcim/power-feeds/\n- /dcim/power-panels/\n- /extras/secrets/\n- /extras/secrets-groups/\n- /extras/jobs/\n- /extras/jobs/scheduled-jobs/approval-queue/\n- /extras/jobs/scheduled-jobs/\n- /extras/job-results/\n- /extras/job-hooks/\n- /extras/job-buttons/\n- /extras/object-changes/\n- /extras/git-repositories/\n- /extras/graphql-queries/\n- /extras/relationships/\n- /extras/notes/\n- /extras/config-contexts/\n- /extras/config-context-schemas/\n- /extras/export-templates/\n- /extras/external-integrations/\n- /extras/webhooks/\n- /extras/computed-fields/\n- /extras/custom-fields/\n- /extras/custom-links/\n\nas well as any similar object-list views provided by any Nautobot App.\n\n### Patches\n\nFixed in Nautobot 1.6.20 and 2.2.3.\n\n### Workarounds\n\nNo workaround has been identified\n\n### References\n\n- #5646 \n- #5647\n\n**Credit to [Michael Panorios](mailto:michael.panorios@pwc.com) for reporting this issue.**",
  "id": "GHSA-jxgr-gcj5-cqqg",
  "modified": "2024-05-01T13:07:14Z",
  "published": "2024-05-01T09:36:35Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32979"
    },
    {
      "type": "WEB",
      "url": "https://github.com/nautobot/nautobot/pull/5646"
    },
    {
      "type": "WEB",
      "url": "https://github.com/nautobot/nautobot/pull/5647"
    },
    {
      "type": "WEB",
      "url": "https://github.com/nautobot/nautobot/commit/2ea5797ea43646d5d8b29433e4c707b5a9758146"
    },
    {
      "type": "WEB",
      "url": "https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/nautobot/nautobot"
    },
    {
      "type": "WEB",
      "url": "https://github.com/nautobot/nautobot/releases/tag/v1.6.20"
    },
    {
      "type": "WEB",
      "url": "https://github.com/nautobot/nautobot/releases/tag/v2.2.3"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L",
      "type": "CVSS_V3"
    }
  ],
  "summary": "nautobot has reflected Cross-site Scripting potential in all object list views"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.