CVE-2023-49084

Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). While using the detected SQL Injection and insufficient processing of the include file path, it is possible to execute arbitrary code on the server. Exploitation of the vulnerability is possible for an authorized user. The vulnerable component is the `link.php`. Impact of the vulnerability execution of arbitrary code on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cacti:cacti:1.2.25:*:*:*:*:*:*:*

History

21 Nov 2024, 08:32

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html -
References () https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp - Exploit, Vendor Advisory () https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp - Exploit, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html - () https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ -
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 8.0

10 Jun 2024, 17:16

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ -

18 Mar 2024, 20:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html -

05 Feb 2024, 17:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html -

29 Dec 2023, 19:09

Type Values Removed Values Added
References () https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp - () https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:cacti:cacti:1.2.25:*:*:*:*:*:*:*
First Time Cacti
Cacti cacti

21 Dec 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-21 23:15

Updated : 2024-11-21 08:32


NVD link : CVE-2023-49084

Mitre link : CVE-2023-49084

CVE.ORG link : CVE-2023-49084


JSON object : View

Products Affected

cacti

  • cacti
CWE
CWE-98

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')