First published: Wed Apr 23 2014(Updated: )
lib/graph_export.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cacti | 1.2.16+ds1-2+deb11u3 1.2.24+ds1-1+deb12u2 1.2.27+ds1-2 | |
Cacti | >=0.8.7<=0.8.7g | |
Cacti | >=0.8.8<=0.8.8b | |
Fedora | =19 | |
Fedora | =20 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Debian | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2328 is classified as a high severity vulnerability due to its potential for remote command execution.
To mitigate CVE-2014-2328, upgrade to Cacti versions 1.2.16+ds1-2+deb11u3, 1.2.24+ds1-1+deb12u2, or 1.2.27+ds1-2.
CVE-2014-2328 affects Cacti versions 0.8.7g, 0.8.8b, and earlier.
No, CVE-2014-2328 requires remote authenticated users to exploit the vulnerability.
Exploitation of CVE-2014-2328 can lead to arbitrary command execution on the server hosting Cacti.