Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-8813

Опубликовано: 22 фев. 2020
Источник: debian
EPSS Критический

Описание

graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cactifixed1.2.10+ds1-1package
cactinot-affectedstretchpackage
cactinot-affectedjessiepackage

Примечания

  • https://gist.github.com/mhaskar/ebe6b74c32fd0f7e1eedf1aabfd44129

  • https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/

  • https://github.com/Cacti/cacti/issues/3285

  • https://github.com/Cacti/cacti/commit/fea919e8fe05bb730c802054661fd3a7ec029784

EPSS

Процентиль: 100%
0.94187
Критический

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 5 лет назад

graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.

CVSS3: 8.8
nvd
больше 5 лет назад

graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.

CVSS3: 8.8
github
около 3 лет назад

graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.

CVSS3: 8.8
fstec
больше 5 лет назад

Уязвимость в файле graph_realtime.php программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольный код

suse-cvrf
около 5 лет назад

Security update for cacti, cacti-spine

EPSS

Процентиль: 100%
0.94187
Критический