8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
62.0%
Issue Overview:
Cacti is an open source operational monitoring and fault management framework. A defect in the sql_save function was discovered. When the column type is numeric, the sql_save function directly utilizes user input. Many files and functions calling the sql_save function do not perform prior validation of user input, leading to the existence of multiple SQL injection vulnerabilities in Cacti. This allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability. (CVE-2023-39357)
Affected Packages:
cacti
Issue Correction:
Run yum update cacti to update your system.
New Packages:
noarch:
cacti-1.1.19-4.22.amzn1.noarch
src:
cacti-1.1.19-4.22.amzn1.src
Red Hat: CVE-2023-39357
Mitre: CVE-2023-39357
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | noarch | cacti | < 1.1.19-4.22.amzn1 | cacti-1.1.19-4.22.amzn1.noarch.rpm |