Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. It was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable. This issue has been fixed in Nautobot versions 1.6.20 and 2.2.3. There are no known workarounds for this vulnerability.
References
Configurations
No configuration.
History
21 Nov 2024, 09:16
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e - | |
References | () https://github.com/nautobot/nautobot/pull/5646 - | |
References | () https://github.com/nautobot/nautobot/pull/5647 - | |
References | () https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg - |
01 May 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 11:15
Updated : 2024-11-21 09:16
NVD link : CVE-2024-32979
Mitre link : CVE-2024-32979
CVE.ORG link : CVE-2024-32979
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')