Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-39358

Опубликовано: 05 сент. 2023
Источник: debian

Описание

Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `reports_user.php` file. In `ajax_get_branches`, the `tree_id` parameter is passed to the `reports_get_branch_select` function without any validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cactifixed1.2.25+ds1-1package
cactifixed1.2.24+ds1-1+deb12u1bookwormpackage
cactinot-affectedbullseyepackage
cactinot-affectedbusterpackage

Примечания

  • https://github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g

  • https://github.com/cacti/cacti/commit/318c377180039b22970f1f6636aa586d3b84c44d (release/1.2.25)

  • https://github.com/cacti/cacti/commit/58a2df17c94fda1cdae74613153524ad1a6aae82 (release/1.2.25)

  • Introduced by: https://github.com/cacti/cacti/commit/26e2dbacf298265ce9e517f6f1f008ec46167b5d (release/1.2.20)

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 2 лет назад

Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `reports_user.php` file. In `ajax_get_branches`, the `tree_id` parameter is passed to the `reports_get_branch_select` function without any validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 8.8
nvd
больше 2 лет назад

Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `reports_user.php` file. In `ajax_get_branches`, the `tree_id` parameter is passed to the `reports_get_branch_select` function without any validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 8.8
fstec
больше 2 лет назад

Уязвимость компонента reports_user.php программного средства мониторинга сети Cacti , позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

suse-cvrf
больше 2 лет назад

Security update for cacti, cacti-spine