THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-29895

Cacti command injection in cmd_realtime.php

AssignerGitHub_M
Reserved2024-03-21
Published2024-05-13
Updated2024-06-04

Description

Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc.



CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

= 1.3.x DEV
affected

References

https://github.com/Cacti/cacti/security/advisories/GHSA-cr28-x256-xf5m

https://github.com/Cacti/cacti/commit/53e8014d1f082034e0646edc6286cde3800c683d

https://github.com/Cacti/cacti/commit/99633903cad0de5ace636249de16f77e57a3c8fc

https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/cmd_realtime.php#L119

cve.org CVE-2024-29895

nvd.nist.gov CVE-2024-29895

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-29895
© Copyright 2024 THREATINT. Made in Cyprus with +