First published: Tue Sep 05 2023(Updated: )
Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | =1.2.24 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
ubuntu/cacti | <1.2.25+ | 1.2.25+ |
ubuntu/cacti | <1.2.25+ | 1.2.25+ |
ubuntu/cacti | <1.2.19+ | 1.2.19+ |
debian/cacti | <=1.2.2+ds1-2+deb10u4 | 1.2.2+ds1-2+deb10u6 1.2.16+ds1-2+deb11u2 1.2.16+ds1-2+deb11u3 1.2.24+ds1-1+deb12u1 1.2.24+ds1-1+deb12u2 1.2.26+ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39361 is a vulnerability discovered in Cacti, an open source operational monitoring and fault management framework, that allows for SQL injection in graph_view.php.
CVE-2023-39361 has a severity rating of 9.8, which is classified as critical.
Cacti version 1.2.24 is affected by CVE-2023-39361.
The CWE ID for CVE-2023-39361 is CWE-89.
To fix the CVE-2023-39361 vulnerability, it is recommended to update Cacti to a version that includes the necessary security patches and to apply any provided fixes or workarounds.