Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). While using the detected SQL Injection and insufficient processing of the include file path, it is possible to execute arbitrary code on the server. Exploitation of the vulnerability is possible for an authorized user. The vulnerable component is the `link.php`. Impact of the vulnerability execution of arbitrary code on the server.
References
Configurations
History
21 Nov 2024, 08:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html - | |
References | () https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp - Exploit, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.0 |
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Mar 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Feb 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Dec 2023, 19:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:cacti:cacti:1.2.25:*:*:*:*:*:*:* | |
First Time |
Cacti
Cacti cacti |
21 Dec 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-21 23:15
Updated : 2024-11-21 08:32
NVD link : CVE-2023-49084
Mitre link : CVE-2023-49084
CVE.ORG link : CVE-2023-49084
JSON object : View
Products Affected
cacti
- cacti
CWE
CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')