Cacti is an open source performance and fault management framework. An admin user can create a device with a malicious hostname containing php code and repeat the installation process (completing only step 5 of the installation process is enough, no need to complete the steps before or after it) to use a php file as the cacti log file. After having the malicious hostname end up in the logs (log poisoning), one can simply go to the log file url to execute commands to achieve RCE. This issue has been addressed in version 1.2.28 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Thu, 17 Oct 2024 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*

Tue, 08 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Cacti
Cacti cacti
CPEs cpe:2.3:a:cacti:cacti:-:*:*:*:*:*:*:*
Vendors & Products Cacti
Cacti cacti
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 07 Oct 2024 20:45:00 +0000

Type Values Removed Values Added
Description Cacti is an open source performance and fault management framework. An admin user can create a device with a malicious hostname containing php code and repeat the installation process (completing only step 5 of the installation process is enough, no need to complete the steps before or after it) to use a php file as the cacti log file. After having the malicious hostname end up in the logs (log poisoning), one can simply go to the log file url to execute commands to achieve RCE. This issue has been addressed in version 1.2.28 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Remote code execution via Log Poisoning in Cacti
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-10-07T20:40:39.173Z

Updated: 2024-10-08T14:22:10.398Z

Reserved: 2024-08-09T14:23:55.512Z

Link: CVE-2024-43363

cve-icon Vulnrichment

Updated: 2024-10-08T14:22:05.038Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-07T21:15:15.743

Modified: 2024-10-17T17:58:55.540

Link: CVE-2024-43363

cve-icon Redhat

No data.