Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php` file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the `api_plugin_hook()` function in the `lib/plugin.php` file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue.
References
Configurations
No configuration.
History
21 Nov 2024, 09:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv - | |
References | () https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r - | |
References | () https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - |
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
14 May 2024, 15:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-14 15:25
Updated : 2024-11-21 09:13
NVD link : CVE-2024-31459
Mitre link : CVE-2024-31459
CVE.ORG link : CVE-2024-31459
JSON object : View
Products Affected
No product.
CWE
CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')