First published: Thu Jun 30 2022(Updated: )
EyesOfNetwork before 07-07-2021 has a Remote Code Execution vulnerability on the mail options configuration page. In the location of the "sendmail" application in the "cacti" configuration page (by default/usr/sbin/sendmail) it is possible to execute any command, which will be executed when we make a test of the configuration ("send test mail").
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EyesOfNetwork EyesOfNetwork | <2021-07-07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40643 has been rated as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2021-40643, it is recommended to upgrade EyesOfNetwork to version 2021-07-07 or later.
CVE-2021-40643 affects EyesOfNetwork versions prior to 2021-07-07 due to a vulnerability in the mail options configuration page.
CVE-2021-40643 is classified as a Remote Code Execution (RCE) vulnerability.
Yes, CVE-2021-40643 can allow an attacker to execute arbitrary commands, potentially leading to unauthorized access to the system.