CVE-2020-7237

Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html
https://ctrsec.io/index.php/2020/01/25/cve-2020-7237-remote-code-execution-in-cacti-rrdtool/ Third Party Advisory
https://github.com/Cacti/cacti/issues/3201 Exploit Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/
https://security.gentoo.org/glsa/202003-40
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html
https://ctrsec.io/index.php/2020/01/25/cve-2020-7237-remote-code-execution-in-cacti-rrdtool/ Third Party Advisory
https://github.com/Cacti/cacti/issues/3201 Exploit Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/
https://security.gentoo.org/glsa/202003-40
Configurations

Configuration 1 (hide)

cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html -
References () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html - () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html -
References () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html - () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html -
References () https://ctrsec.io/index.php/2020/01/25/cve-2020-7237-remote-code-execution-in-cacti-rrdtool/ - Third Party Advisory () https://ctrsec.io/index.php/2020/01/25/cve-2020-7237-remote-code-execution-in-cacti-rrdtool/ - Third Party Advisory
References () https://github.com/Cacti/cacti/issues/3201 - Exploit, Third Party Advisory () https://github.com/Cacti/cacti/issues/3201 - Exploit, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/ -
References () https://security.gentoo.org/glsa/202003-40 - () https://security.gentoo.org/glsa/202003-40 -

07 Nov 2023, 03:25

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/', 'name': 'FEDORA-2020-90f1c8229e', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/', 'name': 'FEDORA-2020-0fc6dd0fd2', 'tags': [], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/ -

Information

Published : 2020-01-20 05:15

Updated : 2024-11-21 05:36


NVD link : CVE-2020-7237

Mitre link : CVE-2020-7237

CVE.ORG link : CVE-2020-7237


JSON object : View

Products Affected

cacti

  • cacti
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')