First published: Mon Jan 20 2020(Updated: )
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | =1.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7237 is a vulnerability in Cacti 1.2.8 that allows remote code execution by privileged users via shell metacharacters.
CVE-2020-7237 has a severity rating of 8.8 (Critical).
CVE-2020-7237 allows remote code execution by using shell metacharacters in the Performance Boost Debug Log field of poller_automation.php.
Only privileged users who are authenticated and have access to modify the Performance Settings can exploit CVE-2020-7237.
To fix CVE-2020-7237, update Cacti to version 1.2.9 or later.