Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-46169

Опубликовано: 05 дек. 2022
Источник: nvd
CVSS3: 9.8
EPSS Критический

Описание

Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the remote_agent.php file. This file can be accessed without authentication. This function retrieves the IP address of the client via get_client_addr and resolves this IP address to the corresponding hostname via gethostbyaddr. After this, it is verified that an entry within the poller table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns true and the client is authorized. This authorization can be bypassed due to the implementation of the get_client_addr function. The function is defined in the file lib/functions.php and checks serval `$_SERVE

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
Версия до 1.2.23 (исключая)

EPSS

Процентиль: 100%
0.94469
Критический

9.8 Critical

CVSS3

Дефекты

CWE-74
CWE-78

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 3 лет назад

Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SE...

CVSS3: 9.8
debian
около 3 лет назад

Cacti is an open source platform which provides a robust and extensibl ...

suse-cvrf
около 3 лет назад

Security update for cacti, cacti-spine

CVSS3: 9.8
fstec
около 3 лет назад

Уязвимость реализации сценария remote_agent.php программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 100%
0.94469
Критический

9.8 Critical

CVSS3

Дефекты

CWE-74
CWE-78