Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-31445
HistoryMay 14, 2024 - 12:00 a.m.

CVE-2024-31445

2024-05-1400:00:00
ubuntu.com
ubuntu.com
3
cacti
sql injection
privilege escalation
remote code execution
patch

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

Cacti provides an operational monitoring and fault management framework.
Prior to version 1.2.27, a SQL injection vulnerability in
automation_get_new_graphs_sql function of api_automation.php allows
authenticated users to exploit these SQL injection vulnerabilities to
perform privilege escalation and remote code execution. In
api_automation.php line 856, the get_request_var('filter') is being
concatenated into the SQL statement without any sanitization. In
api_automation.php line 717, The filter of 'filter' is
FILTER_DEFAULT, which means there is no filter for it. Version 1.2.27
contains a patch for the issue.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%