Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-25641
HistoryMay 14, 2024 - 12:00 a.m.

CVE-2024-25641

2024-05-1400:00:00
ubuntu.com
ubuntu.com
20
cacti
arbitrary file write
vulnerability
php code
security impact
patch
unix

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.003

Percentile

70.5%

Cacti provides an operational monitoring and fault management framework.
Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable
through the “Package Import” feature, allows authenticated users having the
“Import Templates” permission to execute arbitrary PHP code on the web
server. The vulnerability is located within the import_package() function
defined into the /lib/import.php script. The function blindly trusts the
filename and file content provided within the XML data, and writes such
files into the Cacti base path (or even outside, since path traversal
sequences are not filtered). This can be exploited to write or overwrite
arbitrary files on the web server, leading to execution of arbitrary PHP
code or other security impacts. Version 1.2.27 contains a patch for this
issue.

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.003

Percentile

70.5%