As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cacti.net/info/changelog |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T20:19:20.307Z
Reserved: 2021-10-18T00:00:00
Link: CVE-2021-26247

No data.

Status : Modified
Published: 2022-01-19T21:15:08.237
Modified: 2024-11-21T05:55:58.633
Link: CVE-2021-26247

No data.