First published: Mon Sep 23 2019(Updated: )
In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cacti | <=1.2.2+ds1-2<=1.2.2+ds1-2+deb10u1<=1.2.6+ds1-2 | |
Cacti Cacti | <=1.2.6 | |
debian/cacti | 1.2.16+ds1-2+deb11u3 1.2.24+ds1-1+deb12u2 1.2.27+ds1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-16723 is high with a severity value of 4.3.
Authenticated users can bypass authorization checks in Cacti through 1.2.6 by making a direct graph_json.php request with a modified local_graph_id parameter.
Versions 1.2.2+ds1-2, 1.2.2+ds1-2+deb10u1, and 1.2.6+ds1-2 of Cacti are affected by CVE-2019-16723.
There are no specific remedies available for CVE-2019-16723 in Cacti.
You can find more information about CVE-2019-16723 at the following references: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html), [Reference 2](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html), [Reference 3](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html).