9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
7.3 High
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
26.1%
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, Cacti calls compat_password_hash
when users set their password. compat_password_hash
use password_hash
if there is it, else use md5
. When verifying password, it calls compat_password_verify
. In compat_password_verify
, password_verify
is called if there is it, else use md5
. password_verify
and password_hash
are supported on PHP < 5.5.0, following PHP manual. The vulnerability is in compat_password_verify
. Md5-hashed user input is compared with correct password in database by $md5 == $hash
. It is a loose comparison, not ===
. It is a type juggling vulnerability. Version 1.2.27 contains a patch for the issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | cacti | <= 1.2.24+ds1-1+deb12u2 | cacti_1.2.24+ds1-1+deb12u2_all.deb |
Debian | 11 | all | cacti | <= 1.2.16+ds1-2+deb11u3 | cacti_1.2.16+ds1-2+deb11u3_all.deb |
Debian | 10 | all | cacti | <= 1.2.2+ds1-2+deb10u4 | cacti_1.2.2+ds1-2+deb10u4_all.deb |
Debian | 999 | all | cacti | < 1.2.27+ds1-1 | cacti_1.2.27+ds1-1_all.deb |
Debian | 13 | all | cacti | < 1.2.27+ds1-1 | cacti_1.2.27+ds1-1_all.deb |
9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
7.3 High
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
26.1%