First published: Wed Oct 04 2023(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cacti. Authentication is required to exploit this vulnerability. The specific flaw exists within the link endpoint. The issue results from the lack of proper validation of data retrieved from the database prior to passing it to a PHP include function. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account.
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cacti vulnerability is ZDI-23-1499.
The severity of vulnerability ZDI-23-1499 is medium.
This vulnerability affects Cacti installations.
Yes, authentication is required to exploit this vulnerability.
You can find more information about vulnerability ZDI-23-1499 on the Zero Day Initiative website and the Cacti GitHub repository.