
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-49088 is a Cross-Site Scripting (XSS) vulnerability in Cacti, an open source operational monitoring and fault management framework. The vulnerability was discovered as an incomplete fix for CVE-2023-39515 in version 1.2.25, which enables an adversary to execute malicious code in a victim's browser when they hover their mouse over a malicious data source path in data_debug.php. The vulnerability was disclosed in December 2023 and affects Cacti version 1.2.25 (GitHub Advisory).
The vulnerability stems from improper handling of tooltip content in jquery-ui implementation. While HTML encoding was applied to the 'title' attribute and 'value' of the data source path, the 'title' attribute is passed to jquery-ui in an unsafe way. The issue occurs because Cacti overrides jquery-ui's default tooltip behavior in layout.js and managers.php, allowing HTML content in tooltips without proper sanitization. When HTML encoded data is placed in an HTML attribute value, the browser transforms these to proper values, effectively nullifying the HTML encoding protection (GitHub Advisory).
When successfully exploited, the vulnerability allows attackers to perform various malicious actions including victim-account takeover, executing arbitrary actions as the victim user, redirecting users to malicious websites, requesting sensitive information under the guise of the Cacti webpage, running browser-related exploits, and potentially incorporating the victim's browser into a botnet for DDoS attacks. The vulnerability has been assigned a CVSS v3.1 score of 6.1 (Medium) with vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N (GitHub Advisory).
As of the initial disclosure, no complete fix has been included in Cacti. The recommended mitigation is to avoid using HTML content in tooltips of jquery-ui and revert the tooltip processing flow to its default behavior. If HTML content in tooltips is required, the 'title' value should be passed through a sanitization process like 'HTML purifier' before being displayed (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."