Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-39362

Опубликовано: 05 сент. 2023
Источник: debian
EPSS Высокий

Описание

Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cactifixed1.2.25+ds1-1package

Примечания

  • https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp

  • https://github.com/cacti/cacti/commit/cb9ab92f2580fc6cb9b64ce129655fb15e35d056 (release/1.2.25)

  • https://github.com/Cacti/cacti/commit/4c26f39fa3567553192823a5e8096b187bbaddde (release/1.2.25)

  • snmp_escape_string broken and non-exploitable until https://github.com/Cacti/cacti/commit/c66d5815b8381eaa7ef679abc8d041f23105ef34 (release/1.2.23)

  • Requires php-snmp be disabled.

EPSS

Процентиль: 99%
0.86745
Высокий

Связанные уязвимости

CVSS3: 7.2
ubuntu
больше 2 лет назад

Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.2
nvd
больше 2 лет назад

Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.2
fstec
больше 2 лет назад

Уязвимость компонента snmp.php программного средства мониторинга сети Cacti , передаваемых в команду, позволяющая нарушителю выполнить произвольную команду

suse-cvrf
больше 2 лет назад

Security update for cacti, cacti-spine

EPSS

Процентиль: 99%
0.86745
Высокий