Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T01:17:58.192Z
Reserved: 2024-03-21T15:12:08.998Z
Link: CVE-2024-29895
Updated: 2024-08-02T01:17:58.192Z
Status : Awaiting Analysis
Published: 2024-05-14T15:17:15.593
Modified: 2024-11-21T09:08:34.137
Link: CVE-2024-29895
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:00:57Z
Weaknesses