Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-31132
HistorySep 05, 2023 - 9:19 p.m.

CVE-2023-31132 Cacti Privilege Escalation

2023-09-0521:19:22
CWE-306
GitHub_M
github.com
cve-2023-31132
cacti
privilege escalation
php files
windows host
version 1.2.25
upgrade
vulnerability

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a privilege escalation vulnerability. A low-privileged OS user with access to a Windows host where Cacti is installed can create arbitrary PHP files in a web document directory. The user can then execute the PHP files under the security context of SYSTEM. This allows an attacker to escalate privilege from a normal user account to SYSTEM. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"
    ],
    "vendor": "cacti",
    "product": "cacti",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "1.2.25",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total