CVE-2024-34707
May 13, 2024
Nautobot is a Network Source of Truth and Network Automation Platform. A Nautobot user with admin privileges can modify the "BANNER_TOP", "BANNER_BOTTOM", and "BANNER_LOGIN" configuration settings via the "/admin/constance/config/" endpoint. Normally these settings are used to provide custom banner text at the top and bottom of all Nautobot web pages (or specifically on the login page in the case of "BANNER_LOGIN") but it was reported that an admin user can make use of these settings to inject arbitrary HTML, potentially exposing Nautobot users to security issues such as cross-site scripting (stored XSS). The vulnerability is fixed in Nautobot 1.6.22 and 2.2.4.
Affected Packages
nautobot (PYTHON):
Affected version(s) >=0.0.0 <1.6.22Fix Suggestion:
Update to version 1.6.22nautobot (PYTHON):
Affected version(s) >=2.0.0 <2.2.4Fix Suggestion:
Update to version 2.2.4Related ResourcesĀ (7)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
PASSIVE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
HIGH
Vulnerable System Availability
LOW
Subsequent System Confidentiality
LOW
Subsequent System Integrity
HIGH
Subsequent System Availability
LOW
CVSS v3
Base Score:
7.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
LOW
Integrity
HIGH
Availability
LOW
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
EPSS
Base Score:
0.27