Impact
What kind of vulnerability is it? Who is impacted?
All users of Nautobot versions earlier than 1.6.10 or 2.1.2 are potentially impacted.
Due to inadequate input sanitization, any user-editable fields that support Markdown rendering, including:
Circuit.comments
Cluster.comments
CustomField.description
Device.comments
DeviceRedundancyGroup.comments
DeviceType.comments
Job.description
JobLogEntry.message
Location.comments
Note.note
PowerFeed.comments
Provider.noc_contact
Provider.admin_contact
Provider.comments
ProviderNetwork.comments
Rack.comments
Tenant.comments
VirtualMachine.comments
- Contents of any custom fields of type
markdown
- Job class
description attributes
- The
SUPPORT_MESSAGE system configuration setting
are potentially susceptible to cross-site scripting (XSS) attacks via maliciously crafted data.
Patches
Has the problem been patched? What versions should users upgrade to?
Fixed in Nautobot versions 1.6.10 and 2.1.2.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
References
Are there any links users can visit to find out more?
#5133
#5134
Impact
What kind of vulnerability is it? Who is impacted?
All users of Nautobot versions earlier than 1.6.10 or 2.1.2 are potentially impacted.
Due to inadequate input sanitization, any user-editable fields that support Markdown rendering, including:
Circuit.commentsCluster.commentsCustomField.descriptionDevice.commentsDeviceRedundancyGroup.commentsDeviceType.commentsJob.descriptionJobLogEntry.messageLocation.commentsNote.notePowerFeed.commentsProvider.noc_contactProvider.admin_contactProvider.commentsProviderNetwork.commentsRack.commentsTenant.commentsVirtualMachine.commentsmarkdowndescriptionattributesSUPPORT_MESSAGEsystem configuration settingare potentially susceptible to cross-site scripting (XSS) attacks via maliciously crafted data.
Patches
Has the problem been patched? What versions should users upgrade to?
Fixed in Nautobot versions 1.6.10 and 2.1.2.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
References
Are there any links users can visit to find out more?
#5133
#5134