Lucene search

K
amazonAmazonALAS-2023-1842
HistorySep 27, 2023 - 10:15 p.m.

Important: cacti

2023-09-2722:15:00
alas.aws.amazon.com
9
cacti
sql injection
privilege escalation
remote code execution
upgrade
cve-2023-39357

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

62.0%

Issue Overview:

Cacti is an open source operational monitoring and fault management framework. A defect in the sql_save function was discovered. When the column type is numeric, the sql_save function directly utilizes user input. Many files and functions calling the sql_save function do not perform prior validation of user input, leading to the existence of multiple SQL injection vulnerabilities in Cacti. This allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability. (CVE-2023-39357)

Affected Packages:

cacti

Issue Correction:
Run yum update cacti to update your system.

New Packages:

noarch:  
    cacti-1.1.19-4.22.amzn1.noarch  
  
src:  
    cacti-1.1.19-4.22.amzn1.src  

Additional References

Red Hat: CVE-2023-39357

Mitre: CVE-2023-39357

OSVersionArchitecturePackageVersionFilename
Amazon Linux1noarchcacti< 1.1.19-4.22.amzn1cacti-1.1.19-4.22.amzn1.noarch.rpm

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

62.0%