First published: Thu Dec 12 2019(Updated: )
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP module.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | <=1.2.7 | |
Debian Debian Linux | =8.0 | |
openSUSE Leap | =42.3 | |
debian/cacti | 1.2.16+ds1-2+deb11u3 1.2.16+ds1-2+deb11u4 1.2.24+ds1-1+deb12u4 1.2.24+ds1-1+deb12u2 1.2.28+ds1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17358 is a vulnerability in Cacti through 1.2.7 that allows an authenticated attacker to influence object data values and control actions taken by Cacti or potentially cause memory corruption in PHP.
CVE-2019-17358 affects Cacti versions up to and including 1.2.7.
CVE-2019-17358 has a severity rating of 8.1 (high).
An authenticated attacker can exploit CVE-2019-17358 by using unsafe deserialization of user-controlled data to populate arrays in the lib/functions.php file.
Yes, the fix for CVE-2019-17358 is to upgrade to Cacti version 1.2.8+ or apply the recommended patches for specific distributions.