Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a privilege escalation vulnerability. A low-privileged OS user with access to a Windows host where Cacti is installed can create arbitrary PHP files in a web document directory. The user can then execute the PHP files under the security context of SYSTEM. This allows an attacker to escalate privilege from a normal user account to SYSTEM. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-09-05T21:19:22.831Z
Updated: 2024-09-26T19:32:31.240Z
Reserved: 2023-04-24T21:44:10.416Z
Link: CVE-2023-31132
Vulnrichment
Updated: 2024-08-02T14:45:25.782Z
NVD
Status : Modified
Published: 2023-09-05T22:15:08.487
Modified: 2024-11-21T08:01:27.477
Link: CVE-2023-31132
Redhat
No data.