First published: Tue Sep 05 2023(Updated: )
Cacti is an open source operational monitoring and fault management framework. There are two instances of insecure deserialization in Cacti version 1.2.24. While a viable gadget chain exists in Cacti’s vendor directory (phpseclib), the necessary gadgets are not included, making them inaccessible and the insecure deserializations not exploitable. Each instance of insecure deserialization is due to using the unserialize function without sanitizing the user input. Cacti has a “safe” deserialization that attempts to sanitize the content and check for specific values before calling unserialize, but it isn’t used in these instances. The vulnerable code lies in graphs_new.php, specifically within the host_new_graphs_save function. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | <1.2.25 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30534 is a vulnerability found in Cacti version 1.2.24, an open source operational monitoring and fault management framework.
CVE-2023-30534 has a severity rating of medium with a severity value of 4.3.
CVE-2023-30534 affects Cacti version 1.2.24 and prior.
CVE-2023-30534 is associated with Common Weakness Enumeration (CWE) 502.
To fix CVE-2023-30534, it is recommended to update Cacti to version 1.2.25 or later.