First published: Sat Feb 22 2020(Updated: )
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | =1.2.8 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Opmantek Open-AudIT | =3.3.1 | |
Opensuse Suse Package Hub | ||
Opensuse Suse Linux Enterprise Server | =12.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2020-8813.
CVE-2020-8813 has a severity level of critical (8.8).
CVE-2020-8813 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
The software versions affected by CVE-2020-8813 are Cacti 1.2.8, Fedoraproject Fedora 30, Fedoraproject Fedora 31, Fedoraproject Fedora 32, Opmantek Open-AudIT 3.3.1, Opensuse Suse Package Hub, and Debian Debian Linux 10.0.
To fix CVE-2020-8813, it is recommended to upgrade to a patched version of the affected software.