Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-39358
HistorySep 05, 2023 - 9:00 p.m.

CVE-2023-39358 Authenticated SQL injection vulnerability in reports_user.php in Cacti

2023-09-0521:00:32
CWE-89
GitHub_M
github.com
cacti
sql injection
authenticated
reports_user.php
privilege escalation
remote code execution
ajax_get_branches
version 1.2.25
upgrade
vulnerability

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the reports_user.php file. In ajax_get_branches, the tree_id parameter is passed to the reports_get_branch_select function without any validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"
    ],
    "vendor": "cacti",
    "product": "cacti",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "1.2.25",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total