Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4wfp-xfpc-fxcp

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.

Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.

EPSS

Процентиль: 98%
0.46813
Средний

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 6 лет назад

Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.

CVSS3: 8.8
nvd
около 6 лет назад

Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.

CVSS3: 8.8
debian
около 6 лет назад

Cacti 1.2.8 allows Remote Code Execution (by privileged users) via she ...

suse-cvrf
почти 6 лет назад

Security update for cacti, cacti-spine

suse-cvrf
почти 6 лет назад

Security update for cacti, cacti-spine

EPSS

Процентиль: 98%
0.46813
Средний