Cacti provides an operational monitoring and fault management framework. In versions 1.2.25 and prior, it is possible to execute arbitrary SQL code through the `pollers.php` script. An authorized user may be able to execute arbitrary SQL code. The vulnerable component is the `pollers.php`. Impact of the vulnerability - arbitrary SQL code execution. As of time of publication, a patch does not appear to exist.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3765-1 | cacti security update |
Debian DSA |
DSA-5646-1 | cacti security update |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:18:31.593Z
Reserved: 2023-11-21T18:57:30.428Z
Link: CVE-2023-49085
No data.
Status : Modified
Published: 2023-12-22T17:15:07.990
Modified: 2024-11-21T08:32:47.443
Link: CVE-2023-49085
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA