Home

Description

Nautobot is a Network Source of Truth and Network Automation Platform. Prior to v2.4.10 and v1.6.32 , files uploaded by users to Nautobot's MEDIA_ROOT directory, including DeviceType image attachments as well as images attached to a Location, Device, or Rack, are served to users via a URL endpoint that was not enforcing user authentication. As a consequence, such files can be retrieved by anonymous users who know or can guess the correct URL for a given file. Nautobot v2.4.10 and v1.6.32 address this issue by adding enforcement of Nautobot user authentication to this endpoint.

PUBLISHED Reserved 2025-06-02 | Published 2025-06-10 | Updated 2025-06-10 | Assigner GitHub_M




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 1.6.32
affected

>= 2.0.0, < 2.4.10
affected

References

github.com/...utobot/security/advisories/GHSA-rh67-4c8j-hjjh

github.com/nautobot/nautobot/pull/6672

github.com/nautobot/nautobot/pull/6703

github.com/...ommit/9c892dc300429948a4714f743c9c2879d8987340

github.com/...ommit/d99a53b065129cff3a0fa9abe7355a9ef1ad4c95

cve.org (CVE-2025-49143)

nvd.nist.gov (CVE-2025-49143)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.