Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cacti
Cacti cacti Fedoraproject Fedoraproject fedora |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
|
Vendors & Products |
Cacti
Cacti cacti Fedoraproject Fedoraproject fedora |
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-05-13T13:28:58.808Z
Updated: 2024-08-01T23:44:09.935Z
Reserved: 2024-02-08T22:26:33.514Z
Link: CVE-2024-25641
Vulnrichment
Updated: 2024-08-01T23:44:09.935Z
NVD
Status : Analyzed
Published: 2024-05-14T15:05:50.423
Modified: 2024-12-18T20:54:30.227
Link: CVE-2024-25641
Redhat
No data.