First published: Wed Nov 08 2017(Updated: )
Cacti 1.1.27 allows remote authenticated administrators to read arbitrary files by placing the Log Path into a private directory, and then making a clog.php?filename= request, as demonstrated by filename=passwd (with a Log Path under /etc) to read /etc/passwd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | =1.1.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16661 has a medium severity rating, as it allows access to sensitive files by authenticated users.
To fix CVE-2017-16661, upgrade to Cacti version 1.1.28 or later to ensure the vulnerability is patched.
CVE-2017-16661 affects installations of Cacti version 1.1.27 that allow remote authenticated access.
CVE-2017-16661 is a file read vulnerability that can expose sensitive information to authenticated users.
Attackers can exploit CVE-2017-16661 to read arbitrary files on the server, potentially compromising sensitive data.