Vulnerabilites related to nautobot - nautobot
cve-2023-46128
Vulnerability from cvelistv5
Published
2023-10-24 14:17
Modified
2024-09-11 17:02
Severity ?
EPSS score ?
Summary
Nautobot is a Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=<N>` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. The passwords are not exposed in plaintext. This vulnerability has been patched in version 2.0.3.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp | x_refsource_CONFIRM | |
https://github.com/nautobot/nautobot/pull/4692 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:37:39.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp" }, { "name": "https://github.com/nautobot/nautobot/pull/4692", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/4692" }, { "name": "https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46128", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-11T17:01:56.458681Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:02:05.910Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "nautobot", "vendor": "nautobot", "versions": [ { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nautobot is a Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=\u003cN\u003e` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. The passwords are not exposed in plaintext. This vulnerability has been patched in version 2.0.3.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-24T14:17:52.830Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp" }, { "name": "https://github.com/nautobot/nautobot/pull/4692", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/4692" }, { "name": "https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71" } ], "source": { "advisory": "GHSA-r2hw-74xv-4gqp", "discovery": "UNKNOWN" }, "title": "Exposure of hashed user passwords via REST API in Nautobot" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-46128", "datePublished": "2023-10-24T14:17:52.830Z", "dateReserved": "2023-10-16T17:51:35.572Z", "dateUpdated": "2024-09-11T17:02:05.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51649
Vulnerability from cvelistv5
Published
2023-12-22 16:48
Modified
2024-08-02 22:40
Severity ?
EPSS score ?
Summary
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. When submitting a Job to run via a Job Button, only the model-level `extras.run_job` permission is checked (i.e., does the user have permission to run Jobs in general). Object-level permissions (i.e., does the user have permission to run this specific Job?) are not enforced by the URL/view used in this case. A user with permissions to run even a single Job can actually run all configured JobButton Jobs. Fix will be available in Nautobot 1.6.8 and 2.1.0
References
▼ | URL | Tags |
---|---|---|
https://github.com/nautobot/nautobot/security/advisories/GHSA-vf5m-xrhm-v999 | x_refsource_CONFIRM | |
https://github.com/nautobot/nautobot/issues/4988 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/pull/4993 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/pull/4995 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:40:33.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-vf5m-xrhm-v999", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-vf5m-xrhm-v999" }, { "name": "https://github.com/nautobot/nautobot/issues/4988", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/issues/4988" }, { "name": "https://github.com/nautobot/nautobot/pull/4993", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/4993" }, { "name": "https://github.com/nautobot/nautobot/pull/4995", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/4995" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nautobot", "vendor": "nautobot", "versions": [ { "status": "affected", "version": "\u003e= 1.5.14, \u003c 1.6.8" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. When submitting a Job to run via a Job Button, only the model-level `extras.run_job` permission is checked (i.e., does the user have permission to run Jobs in general). Object-level permissions (i.e., does the user have permission to run this specific Job?) are not enforced by the URL/view used in this case. A user with permissions to run even a single Job can actually run all configured JobButton Jobs. Fix will be available in Nautobot 1.6.8 and 2.1.0 " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-22T16:48:19.711Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-vf5m-xrhm-v999", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-vf5m-xrhm-v999" }, { "name": "https://github.com/nautobot/nautobot/issues/4988", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/issues/4988" }, { "name": "https://github.com/nautobot/nautobot/pull/4993", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/4993" }, { "name": "https://github.com/nautobot/nautobot/pull/4995", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/4995" } ], "source": { "advisory": "GHSA-vf5m-xrhm-v999", "discovery": "UNKNOWN" }, "title": "Nautobot missing object-level permissions enforcement when running Job Buttons" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-51649", "datePublished": "2023-12-22T16:48:19.711Z", "dateReserved": "2023-12-20T22:12:04.737Z", "dateUpdated": "2024-08-02T22:40:33.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-34707
Vulnerability from cvelistv5
Published
2024-05-13 19:22
Modified
2024-08-02 02:59
Severity ?
EPSS score ?
Summary
Nautobot is a Network Source of Truth and Network Automation Platform. A Nautobot user with admin privileges can modify the `BANNER_TOP`, `BANNER_BOTTOM`, and `BANNER_LOGIN` configuration settings via the `/admin/constance/config/` endpoint. Normally these settings are used to provide custom banner text at the top and bottom of all Nautobot web pages (or specifically on the login page in the case of `BANNER_LOGIN`) but it was reported that an admin user can make use of these settings to inject arbitrary HTML, potentially exposing Nautobot users to security issues such as cross-site scripting (stored XSS). The vulnerability is fixed in Nautobot 1.6.22 and 2.2.4.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hr-4v48-fjv3 | x_refsource_CONFIRM | |
https://github.com/nautobot/nautobot/pull/5697 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/pull/5698 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/4f0a66bd6307bfe0e0acb899233e0d4ad516f51c | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/f640aedc69c848d3d1be57f0300fc40033ff6423 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-34707", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-15T15:20:33.233925Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:41:11.308Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:59:22.584Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hr-4v48-fjv3", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hr-4v48-fjv3" }, { "name": "https://github.com/nautobot/nautobot/pull/5697", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/5697" }, { "name": "https://github.com/nautobot/nautobot/pull/5698", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/5698" }, { "name": "https://github.com/nautobot/nautobot/commit/4f0a66bd6307bfe0e0acb899233e0d4ad516f51c", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/4f0a66bd6307bfe0e0acb899233e0d4ad516f51c" }, { "name": "https://github.com/nautobot/nautobot/commit/f640aedc69c848d3d1be57f0300fc40033ff6423", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/f640aedc69c848d3d1be57f0300fc40033ff6423" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nautobot", "vendor": "nautobot", "versions": [ { "status": "affected", "version": "\u003c 1.6.22" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nautobot is a Network Source of Truth and Network Automation Platform. A Nautobot user with admin privileges can modify the `BANNER_TOP`, `BANNER_BOTTOM`, and `BANNER_LOGIN` configuration settings via the `/admin/constance/config/` endpoint. Normally these settings are used to provide custom banner text at the top and bottom of all Nautobot web pages (or specifically on the login page in the case of `BANNER_LOGIN`) but it was reported that an admin user can make use of these settings to inject arbitrary HTML, potentially exposing Nautobot users to security issues such as cross-site scripting (stored XSS). The vulnerability is fixed in Nautobot 1.6.22 and 2.2.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-13T19:22:41.202Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hr-4v48-fjv3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hr-4v48-fjv3" }, { "name": "https://github.com/nautobot/nautobot/pull/5697", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/5697" }, { "name": "https://github.com/nautobot/nautobot/pull/5698", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/5698" }, { "name": "https://github.com/nautobot/nautobot/commit/4f0a66bd6307bfe0e0acb899233e0d4ad516f51c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/4f0a66bd6307bfe0e0acb899233e0d4ad516f51c" }, { "name": "https://github.com/nautobot/nautobot/commit/f640aedc69c848d3d1be57f0300fc40033ff6423", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/f640aedc69c848d3d1be57f0300fc40033ff6423" } ], "source": { "advisory": "GHSA-r2hr-4v48-fjv3", "discovery": "UNKNOWN" }, "title": "Nautobot\u0027s BANNER_* configuration can be used to inject arbitrary HTML content into Nautobot pages" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-34707", "datePublished": "2024-05-13T19:22:41.202Z", "dateReserved": "2024-05-07T13:53:00.133Z", "dateUpdated": "2024-08-02T02:59:22.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23345
Vulnerability from cvelistv5
Published
2024-01-22 23:14
Modified
2024-08-01 22:59
Severity ?
EPSS score ?
Summary
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application. All users of Nautobot versions earlier than 1.6.10 or 2.1.2 are potentially impacted by a cross-site scripting vulnerability. Due to inadequate input sanitization, any user-editable fields that support Markdown rendering, including are potentially susceptible to cross-site scripting (XSS) attacks via maliciously crafted data. This issue is fixed in Nautobot versions 1.6.10 and 2.1.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nautobot/nautobot/security/advisories/GHSA-v4xv-795h-rv4h | x_refsource_CONFIRM | |
https://github.com/nautobot/nautobot/pull/5133 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/pull/5134 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/17effcbe84a72150c82b138565c311bbee357e80 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/64312a4297b5ca49b6cdedf477e41e8e4fd61cce | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:32.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-v4xv-795h-rv4h", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-v4xv-795h-rv4h" }, { "name": "https://github.com/nautobot/nautobot/pull/5133", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/5133" }, { "name": "https://github.com/nautobot/nautobot/pull/5134", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/5134" }, { "name": "https://github.com/nautobot/nautobot/commit/17effcbe84a72150c82b138565c311bbee357e80", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/17effcbe84a72150c82b138565c311bbee357e80" }, { "name": "https://github.com/nautobot/nautobot/commit/64312a4297b5ca49b6cdedf477e41e8e4fd61cce", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/64312a4297b5ca49b6cdedf477e41e8e4fd61cce" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nautobot", "vendor": "nautobot", "versions": [ { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.1.2" }, { "status": "affected", "version": "\u003c 1.6.10" } ] } ], "descriptions": [ { "lang": "en", "value": "Nautobot is a Network Source of Truth and Network Automation Platform built as a web application. All users of Nautobot versions earlier than 1.6.10 or 2.1.2 are potentially impacted by a cross-site scripting vulnerability. Due to inadequate input sanitization, any user-editable fields that support Markdown rendering, including are potentially susceptible to cross-site scripting (XSS) attacks via maliciously crafted data. This issue is fixed in Nautobot versions 1.6.10 and 2.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-22T23:14:52.596Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-v4xv-795h-rv4h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-v4xv-795h-rv4h" }, { "name": "https://github.com/nautobot/nautobot/pull/5133", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/5133" }, { "name": "https://github.com/nautobot/nautobot/pull/5134", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/5134" }, { "name": "https://github.com/nautobot/nautobot/commit/17effcbe84a72150c82b138565c311bbee357e80", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/17effcbe84a72150c82b138565c311bbee357e80" }, { "name": "https://github.com/nautobot/nautobot/commit/64312a4297b5ca49b6cdedf477e41e8e4fd61cce", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/64312a4297b5ca49b6cdedf477e41e8e4fd61cce" } ], "source": { "advisory": "GHSA-v4xv-795h-rv4h", "discovery": "UNKNOWN" }, "title": "Nautobot has XSS potential in rendered Markdown fields" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-23345", "datePublished": "2024-01-22T23:14:52.596Z", "dateReserved": "2024-01-15T15:19:19.445Z", "dateUpdated": "2024-08-01T22:59:32.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-50263
Vulnerability from cvelistv5
Published
2023-12-12 22:17
Modified
2024-08-02 22:16
Severity ?
EPSS score ?
Summary
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 1.x and 2.0.x prior to 1.6.7 and 2.0.6, the URLs `/files/get/?name=...` and `/files/download/?name=...` are used to provide admin access to files that have been uploaded as part of a run request for a Job that has FileVar inputs. Under normal operation these files are ephemeral and are deleted once the Job in question runs.
In the default implementation used in Nautobot, as provided by `django-db-file-storage`, these URLs do not by default require any user authentication to access; they should instead be restricted to only users who have permissions to view Nautobot's `FileProxy` model instances.
Note that no URL mechanism is provided for listing or traversal of the available file `name` values, so in practice an unauthenticated user would have to guess names to discover arbitrary files for download, but if a user knows the file name/path value, they can access it without authenticating, so we are considering this a vulnerability.
Fixes are included in Nautobot 1.6.7 and Nautobot 2.0.6. No known workarounds are available other than applying the patches included in those versions.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nautobot/nautobot/security/advisories/GHSA-75mc-3pjc-727q | x_refsource_CONFIRM | |
https://github.com/nautobot/nautobot/pull/4959 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/pull/4964 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/458280c359a4833a20da294eaf4b8d55edc91cee | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/7c4cf3137f45f1541f09f2f6a7f8850cd3a2eaee | x_refsource_MISC | |
https://github.com/victor-o-silva/db_file_storage/blob/master/db_file_storage/views.py | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:16:46.201Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-75mc-3pjc-727q", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-75mc-3pjc-727q" }, { "name": "https://github.com/nautobot/nautobot/pull/4959", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/4959" }, { "name": "https://github.com/nautobot/nautobot/pull/4964", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/4964" }, { "name": "https://github.com/nautobot/nautobot/commit/458280c359a4833a20da294eaf4b8d55edc91cee", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/458280c359a4833a20da294eaf4b8d55edc91cee" }, { "name": "https://github.com/nautobot/nautobot/commit/7c4cf3137f45f1541f09f2f6a7f8850cd3a2eaee", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/7c4cf3137f45f1541f09f2f6a7f8850cd3a2eaee" }, { "name": "https://github.com/victor-o-silva/db_file_storage/blob/master/db_file_storage/views.py", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/victor-o-silva/db_file_storage/blob/master/db_file_storage/views.py" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nautobot", "vendor": "nautobot", "versions": [ { "status": "affected", "version": "\u003e= 1.1.0, \u003c 1.6.7" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 1.x and 2.0.x prior to 1.6.7 and 2.0.6, the URLs `/files/get/?name=...` and `/files/download/?name=...` are used to provide admin access to files that have been uploaded as part of a run request for a Job that has FileVar inputs. Under normal operation these files are ephemeral and are deleted once the Job in question runs. \n\nIn the default implementation used in Nautobot, as provided by `django-db-file-storage`, these URLs do not by default require any user authentication to access; they should instead be restricted to only users who have permissions to view Nautobot\u0027s `FileProxy` model instances.\n\nNote that no URL mechanism is provided for listing or traversal of the available file `name` values, so in practice an unauthenticated user would have to guess names to discover arbitrary files for download, but if a user knows the file name/path value, they can access it without authenticating, so we are considering this a vulnerability.\n\nFixes are included in Nautobot 1.6.7 and Nautobot 2.0.6. No known workarounds are available other than applying the patches included in those versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-12T22:17:00.858Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-75mc-3pjc-727q", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-75mc-3pjc-727q" }, { "name": "https://github.com/nautobot/nautobot/pull/4959", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/4959" }, { "name": "https://github.com/nautobot/nautobot/pull/4964", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/4964" }, { "name": "https://github.com/nautobot/nautobot/commit/458280c359a4833a20da294eaf4b8d55edc91cee", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/458280c359a4833a20da294eaf4b8d55edc91cee" }, { "name": "https://github.com/nautobot/nautobot/commit/7c4cf3137f45f1541f09f2f6a7f8850cd3a2eaee", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/7c4cf3137f45f1541f09f2f6a7f8850cd3a2eaee" }, { "name": "https://github.com/victor-o-silva/db_file_storage/blob/master/db_file_storage/views.py", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/victor-o-silva/db_file_storage/blob/master/db_file_storage/views.py" } ], "source": { "advisory": "GHSA-75mc-3pjc-727q", "discovery": "UNKNOWN" }, "title": "Nautobot allows unauthenticated db-file-storage views" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-50263", "datePublished": "2023-12-12T22:17:00.858Z", "dateReserved": "2023-12-05T20:42:59.379Z", "dateUpdated": "2024-08-02T22:16:46.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36112
Vulnerability from cvelistv5
Published
2024-05-28 22:26
Modified
2024-08-02 03:30
Severity ?
EPSS score ?
Summary
Nautobot is a Network Source of Truth and Network Automation Platform. A user with permissions to view Dynamic Group records (`extras.view_dynamicgroup` permission) can use the Dynamic Group detail UI view (`/extras/dynamic-groups/<uuid>/`) and/or the members REST API view (`/api/extras/dynamic-groups/<uuid>/members/`) to list the objects that are members of a given Dynamic Group. In versions of Nautobot between 1.3.0 (where the Dynamic Groups feature was added) and 1.6.22 inclusive, and 2.0.0 through 2.2.4 inclusive, Nautobot fails to restrict these listings based on the member object permissions - for example a Dynamic Group of Device objects will list all Devices that it contains, regardless of the user's `dcim.view_device` permissions or lack thereof. This issue has been fixed in Nautobot versions 1.6.23 and 2.2.5. Users are advised to upgrade. This vulnerability can be partially mitigated by removing `extras.view_dynamicgroup` permission from users however a full fix will require upgrading.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nautobot/nautobot/security/advisories/GHSA-qmjf-wc2h-6x3q | x_refsource_CONFIRM | |
https://github.com/nautobot/nautobot/pull/5757 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/pull/5762 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36112", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-19T12:59:52.272021Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-19T20:49:26.384Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:30:13.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-qmjf-wc2h-6x3q", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-qmjf-wc2h-6x3q" }, { "name": "https://github.com/nautobot/nautobot/pull/5757", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/5757" }, { "name": "https://github.com/nautobot/nautobot/pull/5762", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/5762" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nautobot", "vendor": "nautobot", "versions": [ { "status": "affected", "version": "\u003e= 1.3.0, \u003c 1.6.23" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.2.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Nautobot is a Network Source of Truth and Network Automation Platform. A user with permissions to view Dynamic Group records (`extras.view_dynamicgroup` permission) can use the Dynamic Group detail UI view (`/extras/dynamic-groups/\u003cuuid\u003e/`) and/or the members REST API view (`/api/extras/dynamic-groups/\u003cuuid\u003e/members/`) to list the objects that are members of a given Dynamic Group. In versions of Nautobot between 1.3.0 (where the Dynamic Groups feature was added) and 1.6.22 inclusive, and 2.0.0 through 2.2.4 inclusive, Nautobot fails to restrict these listings based on the member object permissions - for example a Dynamic Group of Device objects will list all Devices that it contains, regardless of the user\u0027s `dcim.view_device` permissions or lack thereof. This issue has been fixed in Nautobot versions 1.6.23 and 2.2.5. Users are advised to upgrade. This vulnerability can be partially mitigated by removing `extras.view_dynamicgroup` permission from users however a full fix will require upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges ", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755: Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-28T22:26:12.487Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-qmjf-wc2h-6x3q", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-qmjf-wc2h-6x3q" }, { "name": "https://github.com/nautobot/nautobot/pull/5757", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/5757" }, { "name": "https://github.com/nautobot/nautobot/pull/5762", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/5762" } ], "source": { "advisory": "GHSA-qmjf-wc2h-6x3q", "discovery": "UNKNOWN" }, "title": "Nautobot dynamic-group-members doesn\u0027t enforce permission restrictions on member objects" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-36112", "datePublished": "2024-05-28T22:26:12.487Z", "dateReserved": "2024-05-20T21:07:48.187Z", "dateUpdated": "2024-08-02T03:30:13.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32979
Vulnerability from cvelistv5
Published
2024-05-01 10:49
Modified
2024-08-02 02:27
Severity ?
EPSS score ?
Summary
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. It was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable. This issue has been fixed in Nautobot versions 1.6.20 and 2.2.3. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg | x_refsource_CONFIRM | |
https://github.com/nautobot/nautobot/pull/5646 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/pull/5647 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:networktocode:nautobot:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "nautobot", "vendor": "networktocode", "versions": [ { "lessThan": "1.6.20", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:networktocode:nautobot:2.0.0:-:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "nautobot", "vendor": "networktocode", "versions": [ { "lessThanOrEqual": "2.2.3", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32979", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-02T16:56:47.104819Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T18:15:30.948Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg" }, { "name": "https://github.com/nautobot/nautobot/pull/5646", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/5646" }, { "name": "https://github.com/nautobot/nautobot/pull/5647", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/5647" }, { "name": "https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nautobot", "vendor": "nautobot", "versions": [ { "status": "affected", "version": "\u003c 1.6.20" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.2.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. It was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable. This issue has been fixed in Nautobot versions 1.6.20 and 2.2.3. There are no known workarounds for this vulnerability.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T10:49:56.643Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg" }, { "name": "https://github.com/nautobot/nautobot/pull/5646", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/5646" }, { "name": "https://github.com/nautobot/nautobot/pull/5647", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/5647" }, { "name": "https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e" } ], "source": { "advisory": "GHSA-jxgr-gcj5-cqqg", "discovery": "UNKNOWN" }, "title": "Reflected Cross-site Scripting potential in all object list views in Nautobot" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32979", "datePublished": "2024-05-01T10:49:56.643Z", "dateReserved": "2024-04-22T15:14:59.166Z", "dateUpdated": "2024-08-02T02:27:53.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-29199
Vulnerability from cvelistv5
Published
2024-03-26 03:08
Modified
2024-08-02 16:13
Severity ?
EPSS score ?
Summary
Nautobot is a Network Source of Truth and Network Automation Platform. A number of Nautobot URL endpoints were found to be improperly accessible to unauthenticated (anonymous) users. These endpoints will not disclose any Nautobot data to an unauthenticated user unless the Nautobot configuration variable EXEMPT_VIEW_PERMISSIONS is changed from its default value (an empty list) to permit access to specific data by unauthenticated users. This vulnerability is fixed in 1.6.16 and 2.1.9.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nautobot/nautobot/security/advisories/GHSA-m732-wvh2-7cq4 | x_refsource_CONFIRM | |
https://github.com/nautobot/nautobot/pull/5464 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/pull/5465 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/2fd95c365f8477b26e06d60b999ddd36882d5750 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/dd623e6c3307f48b6357fcc91925bcad5192abfb | x_refsource_MISC | |
https://github.com/nautobot/nautobot/releases/tag/v1.6.16 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/releases/tag/v2.1.9 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T01:10:54.048Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-m732-wvh2-7cq4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-m732-wvh2-7cq4" }, { "name": "https://github.com/nautobot/nautobot/pull/5464", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/5464" }, { "name": "https://github.com/nautobot/nautobot/pull/5465", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/5465" }, { "name": "https://github.com/nautobot/nautobot/commit/2fd95c365f8477b26e06d60b999ddd36882d5750", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/2fd95c365f8477b26e06d60b999ddd36882d5750" }, { "name": "https://github.com/nautobot/nautobot/commit/dd623e6c3307f48b6357fcc91925bcad5192abfb", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/dd623e6c3307f48b6357fcc91925bcad5192abfb" }, { "name": "https://github.com/nautobot/nautobot/releases/tag/v1.6.16", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/releases/tag/v1.6.16" }, { "name": "https://github.com/nautobot/nautobot/releases/tag/v2.1.9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/releases/tag/v2.1.9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-29199", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-02T16:13:02.596894Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-02T16:13:27.128Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "nautobot", "vendor": "nautobot", "versions": [ { "status": "affected", "version": "\u003c 1.6.16" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Nautobot is a Network Source of Truth and Network Automation Platform. A number of Nautobot URL endpoints were found to be improperly accessible to unauthenticated (anonymous) users. These endpoints will not disclose any Nautobot data to an unauthenticated user unless the Nautobot configuration variable EXEMPT_VIEW_PERMISSIONS is changed from its default value (an empty list) to permit access to specific data by unauthenticated users. This vulnerability is fixed in 1.6.16 and 2.1.9." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-26T03:08:21.873Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-m732-wvh2-7cq4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-m732-wvh2-7cq4" }, { "name": "https://github.com/nautobot/nautobot/pull/5464", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/5464" }, { "name": "https://github.com/nautobot/nautobot/pull/5465", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/5465" }, { "name": "https://github.com/nautobot/nautobot/commit/2fd95c365f8477b26e06d60b999ddd36882d5750", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/2fd95c365f8477b26e06d60b999ddd36882d5750" }, { "name": "https://github.com/nautobot/nautobot/commit/dd623e6c3307f48b6357fcc91925bcad5192abfb", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/dd623e6c3307f48b6357fcc91925bcad5192abfb" }, { "name": "https://github.com/nautobot/nautobot/releases/tag/v1.6.16", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/releases/tag/v1.6.16" }, { "name": "https://github.com/nautobot/nautobot/releases/tag/v2.1.9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/releases/tag/v2.1.9" } ], "source": { "advisory": "GHSA-m732-wvh2-7cq4", "discovery": "UNKNOWN" }, "title": "Unauthenticated views may expose information to anonymous users" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-29199", "datePublished": "2024-03-26T03:08:21.873Z", "dateReserved": "2024-03-18T17:07:00.095Z", "dateUpdated": "2024-08-02T16:13:27.128Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48705
Vulnerability from cvelistv5
Published
2023-11-22 15:15
Modified
2024-08-02 21:37
Severity ?
EPSS score ?
Summary
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application All users of Nautobot versions earlier than 1.6.6 or 2.0.5 are potentially affected by a cross-site scripting vulnerability. Due to incorrect usage of Django's `mark_safe()` API when rendering certain types of user-authored content; including custom links, job buttons, and computed fields; it is possible that users with permission to create or edit these types of content could craft a malicious payload (such as JavaScript code) that would be executed when rendering pages containing this content. The maintainers have fixed the incorrect uses of `mark_safe()` (generally by replacing them with appropriate use of `format_html()` instead) to prevent such malicious data from being executed. Users on Nautobot 1.6.x LTM should upgrade to v1.6.6 and users on Nautobot 2.0.x should upgrade to v2.0.5. Appropriate object permissions can and should be applied to restrict which users are permitted to create or edit the aforementioned types of user-authored content. Other than that, there is no direct workaround available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nautobot/nautobot/security/advisories/GHSA-cf9f-wmhp-v4pr | x_refsource_CONFIRM | |
https://github.com/nautobot/nautobot/pull/4832 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/pull/4833 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/362850f5a94689a4c75e3188bf6de826c3b012b2 | x_refsource_MISC | |
https://github.com/nautobot/nautobot/commit/54abe23331b6c3d0d82bf1b028c679b1d200920d | x_refsource_MISC | |
https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.html.format_html | x_refsource_MISC | |
https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.safestring.mark_safe | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:37:54.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-cf9f-wmhp-v4pr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-cf9f-wmhp-v4pr" }, { "name": "https://github.com/nautobot/nautobot/pull/4832", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/4832" }, { "name": "https://github.com/nautobot/nautobot/pull/4833", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/pull/4833" }, { "name": "https://github.com/nautobot/nautobot/commit/362850f5a94689a4c75e3188bf6de826c3b012b2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/362850f5a94689a4c75e3188bf6de826c3b012b2" }, { "name": "https://github.com/nautobot/nautobot/commit/54abe23331b6c3d0d82bf1b028c679b1d200920d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/54abe23331b6c3d0d82bf1b028c679b1d200920d" }, { "name": "https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.html.format_html", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.html.format_html" }, { "name": "https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.safestring.mark_safe", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.safestring.mark_safe" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nautobot", "vendor": "nautobot", "versions": [ { "status": "affected", "version": "\u003c 1.6.6" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Nautobot is a Network Source of Truth and Network Automation Platform built as a web application All users of Nautobot versions earlier than 1.6.6 or 2.0.5 are potentially affected by a cross-site scripting vulnerability. Due to incorrect usage of Django\u0027s `mark_safe()` API when rendering certain types of user-authored content; including custom links, job buttons, and computed fields; it is possible that users with permission to create or edit these types of content could craft a malicious payload (such as JavaScript code) that would be executed when rendering pages containing this content. The maintainers have fixed the incorrect uses of `mark_safe()` (generally by replacing them with appropriate use of `format_html()` instead) to prevent such malicious data from being executed. Users on Nautobot 1.6.x LTM should upgrade to v1.6.6 and users on Nautobot 2.0.x should upgrade to v2.0.5. Appropriate object permissions can and should be applied to restrict which users are permitted to create or edit the aforementioned types of user-authored content. Other than that, there is no direct workaround available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-22T15:15:06.189Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-cf9f-wmhp-v4pr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-cf9f-wmhp-v4pr" }, { "name": "https://github.com/nautobot/nautobot/pull/4832", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/4832" }, { "name": "https://github.com/nautobot/nautobot/pull/4833", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/pull/4833" }, { "name": "https://github.com/nautobot/nautobot/commit/362850f5a94689a4c75e3188bf6de826c3b012b2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/362850f5a94689a4c75e3188bf6de826c3b012b2" }, { "name": "https://github.com/nautobot/nautobot/commit/54abe23331b6c3d0d82bf1b028c679b1d200920d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/54abe23331b6c3d0d82bf1b028c679b1d200920d" }, { "name": "https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.html.format_html", "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.html.format_html" }, { "name": "https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.safestring.mark_safe", "tags": [ "x_refsource_MISC" ], "url": "https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.safestring.mark_safe" } ], "source": { "advisory": "GHSA-cf9f-wmhp-v4pr", "discovery": "UNKNOWN" }, "title": "nautobot has XSS potential in custom links, job buttons, and computed fields" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-48705", "datePublished": "2023-11-22T15:15:06.189Z", "dateReserved": "2023-11-17T19:43:37.554Z", "dateUpdated": "2024-08-02T21:37:54.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25657
Vulnerability from cvelistv5
Published
2023-02-21 20:51
Modified
2024-08-02 11:25
Severity ?
EPSS score ?
Summary
Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions earlier than 1.5.7 are impacted by a remote code execution vulnerability. Nautobot did not properly sandbox Jinja2 template rendering. In Nautobot 1.5.7 has enabled sandboxed environments for the Jinja2 template engine used internally for template rendering for the following objects: `extras.ComputedField`, `extras.CustomLink`, `extras.ExportTemplate`, `extras.Secret`, `extras.Webhook`. While no active exploits of this vulnerability are known this change has been made as a preventative measure to protect against any potential remote code execution attacks utilizing maliciously crafted template code. This change forces the Jinja2 template engine to use a `SandboxedEnvironment` on all new installations of Nautobot. This addresses any potential unsafe code execution everywhere the helper function `nautobot.utilities.utils.render_jinja2` is called. Additionally, the documentation that had previously suggesting the direct use of `jinja2.Template` has been revised to suggest `render_jinja2`. Users are advised to upgrade to Nautobot 1.5.7 or newer. For users that are unable to upgrade to the latest release of Nautobot, you may add the following setting to your `nautobot_config.py` to apply the sandbox environment enforcement: `TEMPLATES[1]["OPTIONS"]["environment"] = "jinja2.sandbox.SandboxedEnvironment"` After applying this change, you must restart all Nautobot services, including any Celery worker processes. **Note:** *Nautobot specifies two template engines by default, the first being “django” for the Django built-in template engine, and the second being “jinja” for the Jinja2 template engine. This recommended setting will update the second item in the list of template engines, which is the Jinja2 engine.* For users that are unable to immediately update their configuration such as if a Nautobot service restart is too disruptive to operations, access to provide custom Jinja2 template values may be mitigated using permissions to restrict “change” (write) actions to the affected object types listed in the first section. **Note:** *This solution is intended to be stopgap until you can successfully update your `nautobot_config.py` or upgrade your Nautobot instance to apply the sandboxed environment enforcement.*
References
▼ | URL | Tags |
---|---|---|
https://github.com/nautobot/nautobot/security/advisories/GHSA-8mfq-f5wj-vw5m | x_refsource_CONFIRM | |
https://github.com/nautobot/nautobot/commit/d47f157e83b0c353bb2b697f911882c71cf90ca0 | x_refsource_MISC | |
https://jinja.palletsprojects.com/en/3.0.x/sandbox/#sandbox | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:25:19.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-8mfq-f5wj-vw5m", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-8mfq-f5wj-vw5m" }, { "name": "https://github.com/nautobot/nautobot/commit/d47f157e83b0c353bb2b697f911882c71cf90ca0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nautobot/nautobot/commit/d47f157e83b0c353bb2b697f911882c71cf90ca0" }, { "name": "https://jinja.palletsprojects.com/en/3.0.x/sandbox/#sandbox", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jinja.palletsprojects.com/en/3.0.x/sandbox/#sandbox" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nautobot", "vendor": "nautobot", "versions": [ { "status": "affected", "version": "\u003c 1.5.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions earlier than 1.5.7 are impacted by a remote code execution vulnerability. Nautobot did not properly sandbox Jinja2 template rendering. In Nautobot 1.5.7 has enabled sandboxed environments for the Jinja2 template engine used internally for template rendering for the following objects: `extras.ComputedField`, `extras.CustomLink`, `extras.ExportTemplate`, `extras.Secret`, `extras.Webhook`. While no active exploits of this vulnerability are known this change has been made as a preventative measure to protect against any potential remote code execution attacks utilizing maliciously crafted template code. This change forces the Jinja2 template engine to use a `SandboxedEnvironment` on all new installations of Nautobot. This addresses any potential unsafe code execution everywhere the helper function `nautobot.utilities.utils.render_jinja2` is called. Additionally, the documentation that had previously suggesting the direct use of `jinja2.Template` has been revised to suggest `render_jinja2`. Users are advised to upgrade to Nautobot 1.5.7 or newer. For users that are unable to upgrade to the latest release of Nautobot, you may add the following setting to your `nautobot_config.py` to apply the sandbox environment enforcement: `TEMPLATES[1][\"OPTIONS\"][\"environment\"] = \"jinja2.sandbox.SandboxedEnvironment\"` After applying this change, you must restart all Nautobot services, including any Celery worker processes. **Note:** *Nautobot specifies two template engines by default, the first being \u201cdjango\u201d for the Django built-in template engine, and the second being \u201cjinja\u201d for the Jinja2 template engine. This recommended setting will update the second item in the list of template engines, which is the Jinja2 engine.* For users that are unable to immediately update their configuration such as if a Nautobot service restart is too disruptive to operations, access to provide custom Jinja2 template values may be mitigated using permissions to restrict \u201cchange\u201d (write) actions to the affected object types listed in the first section. **Note:** *This solution is intended to be stopgap until you can successfully update your `nautobot_config.py` or upgrade your Nautobot instance to apply the sandboxed environment enforcement.*" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-21T20:51:39.926Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nautobot/nautobot/security/advisories/GHSA-8mfq-f5wj-vw5m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-8mfq-f5wj-vw5m" }, { "name": "https://github.com/nautobot/nautobot/commit/d47f157e83b0c353bb2b697f911882c71cf90ca0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nautobot/nautobot/commit/d47f157e83b0c353bb2b697f911882c71cf90ca0" }, { "name": "https://jinja.palletsprojects.com/en/3.0.x/sandbox/#sandbox", "tags": [ "x_refsource_MISC" ], "url": "https://jinja.palletsprojects.com/en/3.0.x/sandbox/#sandbox" } ], "source": { "advisory": "GHSA-8mfq-f5wj-vw5m", "discovery": "UNKNOWN" }, "title": "Remote code execution in Jinja2 template rendering in Nautobot" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25657", "datePublished": "2023-02-21T20:51:39.926Z", "dateReserved": "2023-02-09T20:58:21.857Z", "dateUpdated": "2024-08-02T11:25:19.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }