EyesOfNetwork before 07-07-2021 has a Remote Code Execution vulnerability on the mail options configuration page. In the location of the "sendmail" application in the "cacti" configuration page (by default/usr/sbin/sendmail) it is possible to execute any command, which will be executed when we make a test of the configuration ("send test mail").
References
Link | Resource |
---|---|
https://eyesofnetwork.com | Broken Link |
https://www.eyesofnetwork.com/en/news/vulnerabilite-cacti | Patch Vendor Advisory |
https://eyesofnetwork.com | Broken Link |
https://www.eyesofnetwork.com/en/news/vulnerabilite-cacti | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 06:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://eyesofnetwork.com - Broken Link | |
References | () https://www.eyesofnetwork.com/en/news/vulnerabilite-cacti - Patch, Vendor Advisory |
Information
Published : 2022-06-30 11:15
Updated : 2024-11-21 06:24
NVD link : CVE-2021-40643
Mitre link : CVE-2021-40643
CVE.ORG link : CVE-2021-40643
JSON object : View
Products Affected
eyesofnetwork
- eyesofnetwork
CWE