Lucene search

K
cveGitHub_MCVE-2024-31459
HistoryMay 14, 2024 - 3:25 p.m.

CVE-2024-31459

2024-05-1415:25:26
CWE-98
GitHub_M
web.nvd.nist.gov
32
cacti
file inclusion
sql injection
remote code execution
patch
api_plugin_hook
database tables

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

8.2

Confidence

Low

EPSS

0

Percentile

15.5%

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the lib/plugin.php file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the api_plugin_hook() function in the lib/plugin.php file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue.

Affected configurations

Vulners
Vulnrichment
Node
cacticactiRange<1.2.27
VendorProductVersionCPE
cacticacti*cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Cacti",
    "product": "cacti",
    "versions": [
      {
        "version": "< 1.2.27",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

8.2

Confidence

Low

EPSS

0

Percentile

15.5%