We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)
Ok

THREATINT
PUBLISHED

CVE-2024-31459

Cacti RCE vulnerability by file include in lib/plugin.php

Reserved:2024-04-03
Published:2024-05-13
Updated:2024-05-13

Description

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php` file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the `api_plugin_hook()` function in the `lib/plugin.php` file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue.



HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

Product status

< 1.2.27
affected

References

https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv

https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r

https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp

cve.org CVE-2024-31459

nvd.nist.gov CVE-2024-31459

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-31459