Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-39359

Опубликовано: 05 сент. 2023
Источник: debian
EPSS Низкий

Описание

Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `graphs.php` file. When dealing with the cases of ajax_hosts and ajax_hosts_noany, if the `site_id` parameter is greater than 0, it is directly reflected in the WHERE clause of the SQL statement. This creates an SQL injection vulnerability. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cactifixed1.2.25+ds1-1package
cactinot-affectedbusterpackage

Примечания

  • https://github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h

  • https://github.com/cacti/cacti/commit/7459ff57abcd97ab8bc7a19de9e308ca62c17d38 (release/1.2.25)

  • Introduced by: https://github.com/cacti/cacti/commit/518800fdb0bd25f311a530d78bab635b3c96c500 (release/1.2.7)

EPSS

Процентиль: 89%
0.04724
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 2 лет назад

Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `graphs.php` file. When dealing with the cases of ajax_hosts and ajax_hosts_noany, if the `site_id` parameter is greater than 0, it is directly reflected in the WHERE clause of the SQL statement. This creates an SQL injection vulnerability. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 8.8
nvd
больше 2 лет назад

Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `graphs.php` file. When dealing with the cases of ajax_hosts and ajax_hosts_noany, if the `site_id` parameter is greater than 0, it is directly reflected in the WHERE clause of the SQL statement. This creates an SQL injection vulnerability. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 8.8
fstec
больше 2 лет назад

Уязвимость функций ajax_hosts() и ajax_hosts_noany() (graphs.php) программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольные SQL-запросы

suse-cvrf
больше 2 лет назад

Security update for cacti, cacti-spine

EPSS

Процентиль: 89%
0.04724
Низкий