Podatność CVE-2023-39362


Publikacja: 2023-09-05   Modyfikacja: 2023-09-06

Opis:
Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

W naszej bazie, znaleźliśmy następujące noty dla tego CVE:
Tytuł
Autor
Data
High
Cacti 1.2.24 Authenticated command injection when using SNMP options
Antonio Francesc...
29.01.2024

Typ:

CWE-78

(Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') )

 Referencje:
https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp

Copyright 2024, cxsecurity.com

 

Back to Top