Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T09:25:48.614Z
Reserved: 2020-01-20T00:00:00
Link: CVE-2020-7237
No data.
Status : Modified
Published: 2020-01-20T05:15:11.687
Modified: 2024-11-21T05:36:53.633
Link: CVE-2020-7237
No data.
OpenCVE Enrichment
No data.
Weaknesses