Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-25641
HistoryMay 14, 2024 - 12:00 a.m.

CVE-2024-25641

2024-05-1400:00:00
ubuntu.com
ubuntu.com
5
cacti
arbitrary file write
vulnerability
php code
security impact
patch
unix

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.6%

Cacti provides an operational monitoring and fault management framework.
Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable
through the “Package Import” feature, allows authenticated users having the
“Import Templates” permission to execute arbitrary PHP code on the web
server. The vulnerability is located within the import_package() function
defined into the /lib/import.php script. The function blindly trusts the
filename and file content provided within the XML data, and writes such
files into the Cacti base path (or even outside, since path traversal
sequences are not filtered). This can be exploited to write or overwrite
arbitrary files on the web server, leading to execution of arbitrary PHP
code or other security impacts. Version 1.2.27 contains a patch for this
issue.

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.6%