First published: Wed Jan 15 2020(Updated: )
** DISPUTED ** data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | =1.2.8 | |
=1.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7058 is a vulnerability in Cacti 1.2.8 that allows remote code execution.
This vulnerability can be exploited by sending a crafted Input String to the Data Collection -> Data Input Methods -> Unix -> Ping Host feature in Cacti 1.2.8.
The severity of CVE-2020-7058 is high with a CVSS score of 8.8.
The vendor has disputed the vulnerability and stated that it is a false alarm.
You can find more information about CVE-2020-7058 in the GitHub issue: https://github.com/Cacti/cacti/issues/3186.