
CVE-2024-23345 – Nautobot has XSS potential in rendered Markdown fields
https://notcve.org/view.php?id=CVE-2024-23345
22 Jan 2024 — Nautobot is a Network Source of Truth and Network Automation Platform built as a web application. All users of Nautobot versions earlier than 1.6.10 or 2.1.2 are potentially impacted by a cross-site scripting vulnerability. Due to inadequate input sanitization, any user-editable fields that support Markdown rendering, including are potentially susceptible to cross-site scripting (XSS) attacks via maliciously crafted data. This issue is fixed in Nautobot versions 1.6.10 and 2.1.2. Nautobot es una plataforma ... • https://github.com/nautobot/nautobot/commit/17effcbe84a72150c82b138565c311bbee357e80 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-51649 – Nautobot missing object-level permissions enforcement when running Job Buttons
https://notcve.org/view.php?id=CVE-2023-51649
22 Dec 2023 — Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. When submitting a Job to run via a Job Button, only the model-level `extras.run_job` permission is checked (i.e., does the user have permission to run Jobs in general). Object-level permissions (i.e., does the user have permission to run this specific Job?) are not enforced by the URL/view used in this case. A user with permissions to run even... • https://github.com/nautobot/nautobot/issues/4988 • CWE-863: Incorrect Authorization •

CVE-2023-50263 – Nautobot allows unauthenticated db-file-storage views
https://notcve.org/view.php?id=CVE-2023-50263
12 Dec 2023 — Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 1.x and 2.0.x prior to 1.6.7 and 2.0.6, the URLs `/files/get/?name=...` and `/files/download/?name=...` are used to provide admin access to files that have been uploaded as part of a run request for a Job that has FileVar inputs. Under normal operation these files are ephemeral and are deleted once the Job in question runs. • https://github.com/nautobot/nautobot/commit/458280c359a4833a20da294eaf4b8d55edc91cee • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-306: Missing Authentication for Critical Function •

CVE-2023-48705 – nautobot has XSS potential in custom links, job buttons, and computed fields
https://notcve.org/view.php?id=CVE-2023-48705
22 Nov 2023 — Nautobot is a Network Source of Truth and Network Automation Platform built as a web application All users of Nautobot versions earlier than 1.6.6 or 2.0.5 are potentially affected by a cross-site scripting vulnerability. Due to incorrect usage of Django's `mark_safe()` API when rendering certain types of user-authored content; including custom links, job buttons, and computed fields; it is possible that users with permission to create or edit these types of content could craft a malicious payload (such as ... • https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.html.format_html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-46128 – Exposure of hashed user passwords via REST API in Nautobot
https://notcve.org/view.php?id=CVE-2023-46128
24 Oct 2023 — Nautobot is a Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=<N>` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. The passwords are not exposed in plaintext. This vulnerability has been patched in version 2.0.3. • https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-312: Cleartext Storage of Sensitive Information •

CVE-2023-25657 – Remote code execution in Jinja2 template rendering in Nautobot
https://notcve.org/view.php?id=CVE-2023-25657
21 Feb 2023 — Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions earlier than 1.5.7 are impacted by a remote code execution vulnerability. Nautobot did not properly sandbox Jinja2 template rendering. In Nautobot 1.5.7 has enabled sandboxed environments for the Jinja2 template engine used internally for template rendering for the following objects: `extras.ComputedField`, `extras.CustomLink`, `extras.ExportTemplate`, `extras.Secret`, `extras.Webhook`. While no active expl... • https://github.com/nautobot/nautobot/commit/d47f157e83b0c353bb2b697f911882c71cf90ca0 • CWE-94: Improper Control of Generation of Code ('Code Injection') •