First published: Tue Sep 05 2023(Updated: )
Cacti is an open source operational monitoring and fault management framework. Issues with Cacti Regular Expression validation combined with the external links feature can lead to limited SQL Injections and subsequent data leakage. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | <1.2.25 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
debian/cacti | <=1.2.2+ds1-2+deb10u4<=1.2.2+ds1-2+deb10u5<=1.2.16+ds1-2+deb11u1<=1.2.24+ds1-1 | 1.2.16+ds1-2+deb11u2 1.2.24+ds1-1+deb12u1 1.2.25+ds1-2 |
Cacti Cacti |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39365 is a vulnerability in the Cacti open source operational monitoring and fault management framework that can lead to limited SQL Injections and subsequent data leakage.
The severity of CVE-2023-39365 is rated as medium with a CVSS score of 6.3.
CVE-2023-39365 affects Cacti versions up to and excluding 1.2.25, allowing for limited SQL Injections and potential data leakage.
To fix CVE-2023-39365, users are advised to upgrade to Cacti version 1.2.25.
For more information about CVE-2023-39365, you can visit the Cacti Security Advisories page on GitHub (link provided in the references).