First published: Tue Sep 05 2023(Updated: )
Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `reports_user.php` file. In `ajax_get_branches`, the `tree_id` parameter is passed to the `reports_get_branch_select` function without any validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | <1.2.25 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39358 is an authenticated SQL injection vulnerability in Cacti, allowing authenticated users to perform privilege escalation and remote code execution.
CVE-2023-39358 affects Cacti version 1.2.25. It allows authenticated users to perform privilege escalation and remote code execution.
CVE-2023-39358 has a severity rating of 8.8 (high).
To fix CVE-2023-39358 in Cacti, you should update to a version beyond 1.2.25, which is the affected version.
You can find more information about CVE-2023-39358 on the official GitHub page of Cacti: [link](https://github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g)