Описание
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| devel | not-affected | 1.2.9+ds1-1ubuntu1 |
| disco | ignored | end of life |
| eoan | ignored | end of life |
| esm-apps/bionic | needed | |
| esm-apps/focal | not-affected | 1.2.9+ds1-1ubuntu1 |
| esm-apps/jammy | not-affected | 1.2.9+ds1-1ubuntu1 |
| esm-apps/noble | not-affected | 1.2.9+ds1-1ubuntu1 |
| esm-apps/xenial | needed | |
| esm-infra-legacy/trusty | needs-triage |
Показывать по
9 Critical
CVSS2
8.8 High
CVSS3
Связанные уязвимости
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via she ...
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
9 Critical
CVSS2
8.8 High
CVSS3