First published: Fri Dec 22 2023(Updated: )
Cacti provides an operational monitoring and fault management framework. In versions 1.2.25 and prior, it is possible to execute arbitrary SQL code through the `pollers.php` script. An authorized user may be able to execute arbitrary SQL code. The vulnerable component is the `pollers.php`. Impact of the vulnerability - arbitrary SQL code execution. As of time of publication, a patch does not appear to exist.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | <=1.2.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49085 has a high severity rating due to its potential for arbitrary SQL code execution.
To fix CVE-2023-49085, upgrade Cacti to version 1.2.26 or later.
CVE-2023-49085 affects Cacti versions 1.2.25 and prior.
No, only authorized users can exploit CVE-2023-49085 to execute arbitrary SQL code.
The vulnerable component in CVE-2023-49085 is the pollers.php script.