First published: Tue Sep 05 2023(Updated: )
Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `graphs.php` file. When dealing with the cases of ajax_hosts and ajax_hosts_noany, if the `site_id` parameter is greater than 0, it is directly reflected in the WHERE clause of the SQL statement. This creates an SQL injection vulnerability. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | <1.2.25 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
debian/cacti | <=1.2.2+ds1-2+deb10u4<=1.2.2+ds1-2+deb10u5<=1.2.16+ds1-2+deb11u1<=1.2.24+ds1-1 | 1.2.16+ds1-2+deb11u2 1.2.24+ds1-1+deb12u1 1.2.25+ds1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of the Cacti vulnerability is CVE-2023-39359.
Cacti is an open source operational monitoring and fault management framework.
The severity of CVE-2023-39359 is high.
CVE-2023-39359 allows authenticated users to perform privilege escalation and remote code execution in Cacti.
To fix CVE-2023-39359, you should update Cacti to version 1.2.26 or later.