First published: Wed Nov 08 2017(Updated: )
Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | =1.1.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16660 has a high severity rating due to its potential for Remote Code Execution.
To fix CVE-2017-16660, ensure that the Log Path is located outside the web root and update to a newer version of Cacti.
CVE-2017-16660 affects Cacti version 1.1.27, particularly remote authenticated administrators.
CVE-2017-16660 enables Remote Code Execution attacks by exploiting the handling of the Client-ip header.
No, CVE-2017-16660 requires remote authentication for exploitation.