Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. It was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable. This issue has been fixed in Nautobot versions 1.6.20 and 2.2.3. There are no known workarounds for this vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 18:54
Type | Values Removed | Values Added |
---|---|---|
First Time |
Networktocode
Networktocode nautobot |
|
CPE | cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:* | |
References | () https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e - Patch | |
References | () https://github.com/nautobot/nautobot/pull/5646 - Patch | |
References | () https://github.com/nautobot/nautobot/pull/5647 - Patch | |
References | () https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg - Third Party Advisory |
21 Nov 2024, 09:16
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e - | |
References | () https://github.com/nautobot/nautobot/pull/5646 - | |
References | () https://github.com/nautobot/nautobot/pull/5647 - | |
References | () https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg - |
01 May 2024, 13:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 11:15
Updated : 2025-08-26 18:54
NVD link : CVE-2024-32979
Mitre link : CVE-2024-32979
CVE.ORG link : CVE-2024-32979
JSON object : View
Products Affected
networktocode
- nautobot
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')