THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-31459

Cacti RCE vulnerability by file include in lib/plugin.php

AssignerGitHub_M
Reserved2024-04-03
Published2024-05-13
Updated2024-06-04

Description

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php` file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the `api_plugin_hook()` function in the `lib/plugin.php` file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue.



HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

Product status

< 1.2.27
affected

References

https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv

https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r

https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp

cve.org CVE-2024-31459

nvd.nist.gov CVE-2024-31459

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-31459
© Copyright 2024 THREATINT. Made in Cyprus with +