Описание
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
cacti | fixed | 1.2.10+ds1-1 | package | |
cacti | not-affected | stretch | package | |
cacti | not-affected | jessie | package |
Примечания
https://gist.github.com/mhaskar/ebe6b74c32fd0f7e1eedf1aabfd44129
https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/
https://github.com/Cacti/cacti/issues/3285
https://github.com/Cacti/cacti/commit/fea919e8fe05bb730c802054661fd3a7ec029784
EPSS
Связанные уязвимости
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
Уязвимость в файле graph_realtime.php программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольный код
EPSS