Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38972: n/a

0
Medium
VulnerabilityCVE-2024-38972cvecve-2024-38972
Published: Tue Jul 09 2024 (07/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-38972 is a medium severity cross-site scripting (XSS) vulnerability in NetBox version 4. 0. 3. It allows attackers to inject arbitrary web scripts or HTML via the Name parameter on the /dcim/power-ports/add/ endpoint. Exploitation requires user interaction but no authentication, and the vulnerability affects confidentiality and integrity with no direct impact on availability. There are no known exploits in the wild currently, and no official patches have been released yet. The vulnerability stems from improper input sanitization leading to CWE-79. Organizations using NetBox 4. 0. 3 should be cautious and implement mitigations to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:41:32 UTC

Technical Analysis

CVE-2024-38972 is a cross-site scripting (XSS) vulnerability identified in NetBox version 4.0.3, a popular open-source IP address management (IPAM) and data center infrastructure management (DCIM) tool. The vulnerability exists in the handling of the Name parameter on the /dcim/power-ports/add/ web endpoint. An attacker can craft a malicious payload that, when injected into this parameter, results in the execution of arbitrary JavaScript or HTML code within the context of the victim's browser session. This type of vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.1, reflecting a medium severity level. The vector indicates that the attack can be performed remotely (AV:N) with low attack complexity (AC:L), requires no privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the security scope of the vulnerable component. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability could be leveraged by attackers to steal session cookies, perform actions on behalf of authenticated users, or conduct phishing attacks by injecting malicious content into the web interface. Given NetBox’s role in managing critical network infrastructure data, exploitation could lead to significant operational risks.

Potential Impact

The impact of CVE-2024-38972 is primarily on the confidentiality and integrity of data within the NetBox application. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, unauthorized actions, or the injection of misleading information. Since NetBox is widely used for managing IP addresses and data center infrastructure, such attacks could disrupt network management processes or expose sensitive network topology and configuration data. Although availability is not directly affected, the compromise of integrity and confidentiality could indirectly impact operational stability and trust in the management system. Organizations relying on NetBox for critical infrastructure management, especially those with large-scale deployments, face increased risk of targeted attacks aiming to leverage this vulnerability for lateral movement or reconnaissance within their networks.

Mitigation Recommendations

To mitigate CVE-2024-38972, organizations should implement the following specific measures: 1) Apply any official patches or updates from NetBox as soon as they become available. 2) In the absence of patches, implement web application firewall (WAF) rules to detect and block malicious payloads targeting the /dcim/power-ports/add/ endpoint, focusing on suspicious input in the Name parameter. 3) Enforce strict input validation and output encoding on all user-supplied data within the application, particularly for the affected parameter, to prevent script injection. 4) Limit user permissions to only those necessary, reducing the number of users who can access the vulnerable functionality. 5) Educate users about the risks of interacting with untrusted links or content within the NetBox interface to reduce the likelihood of successful user interaction exploitation. 6) Monitor application logs for unusual activity or repeated attempts to inject scripts. 7) Consider deploying Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable endpoint and parameter, user interaction requirements, and the operational context of NetBox.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c7eb7ef31ef0b56501b

Added to database: 2/25/2026, 9:41:18 PM

Last enriched: 2/26/2026, 5:41:32 AM

Last updated: 2/26/2026, 6:11:20 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats