Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
References
Configurations
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html - | |
References | () https://ctrsec.io/index.php/2020/01/25/cve-2020-7237-remote-code-execution-in-cacti-rrdtool/ - Third Party Advisory | |
References | () https://github.com/Cacti/cacti/issues/3201 - Exploit, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/ - | |
References | () https://security.gentoo.org/glsa/202003-40 - |
07 Nov 2023, 03:25
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-01-20 05:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-7237
Mitre link : CVE-2020-7237
CVE.ORG link : CVE-2020-7237
JSON object : View
Products Affected
cacti
- cacti
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')