First published: Mon May 13 2024(Updated: )
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cacti | <=1.2.16+ds1-2+deb11u3<=1.2.24+ds1-1+deb12u2 | 1.2.16+ds1-2+deb11u4 1.2.24+ds1-1+deb12u4 1.2.27+ds1-2 |
Cacti | <1.2.27 | |
Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25641 has been classified as a high severity vulnerability due to its potential to allow arbitrary PHP code execution.
To mitigate CVE-2024-25641, update Cacti to version 1.2.27 or later.
CVE-2024-25641 affects all versions of Cacti prior to 1.2.27, particularly those with the 'Import Templates' permission.
The implications of CVE-2024-25641 include unauthorized access and execution of arbitrary PHP code by authenticated users.
CVE-2024-25641 was reported in May 2024.