First published: Thu Dec 21 2023(Updated: )
Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). While using the detected SQL Injection and insufficient processing of the include file path, it is possible to execute arbitrary code on the server. Exploitation of the vulnerability is possible for an authorized user. The vulnerable component is the `link.php`. Impact of the vulnerability execution of arbitrary code on the server.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | =1.2.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49084 is rated as critical due to the potential for remote code execution via SQL injection.
To mitigate CVE-2023-49084, upgrade to the latest version of Cacti that addresses this vulnerability.
CVE-2023-49084 specifically affects Cacti version 1.2.25.
Yes, CVE-2023-49084 can potentially lead to unauthorized access to sensitive data through code execution.
No, it is not safe to use Cacti version 1.2.25 until the vulnerability CVE-2023-49084 has been patched.