Lucene search

K
zdiSteven Seeley (mr_me) of Source InciteZDI-23-093
HistoryJan 31, 2023 - 12:00 a.m.

Cacti poll_for_data Command Injection Remote Code Execution Vulnerability

2023-01-3100:00:00
Steven Seeley (mr_me) of Source Incite
www.zerodayinitiative.com
24
cacti poll_for_data remote code execution
unauthenticated attack
user-supplied string
system call execution
service account context

0.964 High

EPSS

Percentile

99.6%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cacti. Authentication is not required to exploit this vulnerability. The specific flaw exists within the poll_for_data function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account.