Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header.
References
Link | Resource |
---|---|
https://github.com/Cacti/cacti/issues/1066 | Exploit Issue Tracking Patch |
https://github.com/Cacti/cacti/issues/1066 | Exploit Issue Tracking Patch |
Configurations
History
21 Nov 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Cacti/cacti/issues/1066 - Exploit, Issue Tracking, Patch |
Information
Published : 2017-11-08 05:29
Updated : 2024-11-21 03:16
NVD link : CVE-2017-16660
Mitre link : CVE-2017-16660
CVE.ORG link : CVE-2017-16660
JSON object : View
Products Affected
cacti
- cacti
CWE
CWE-668
Exposure of Resource to Wrong Sphere