Description
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T09:25:48.614Z
Reserved: 2020-01-20T00:00:00.000Z
Link: CVE-2020-7237
No data.
Status : Modified
Published: 2020-01-20T05:15:11.687
Modified: 2024-11-21T05:36:53.633
Link: CVE-2020-7237
No data.
OpenCVE Enrichment
No data.
Weaknesses