Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-39365
HistorySep 05, 2023 - 9:03 p.m.

CVE-2023-39365 Unchecked regular expressions can lead to SQL Injection and data leakage in Cacti

2023-09-0521:03:56
CWE-89
GitHub_M
github.com
2
cve-2023-39365
cacti
sql injection
data leakage
regular expression
validation
upgrade

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

44.9%

Cacti is an open source operational monitoring and fault management framework. Issues with Cacti Regular Expression validation combined with the external links feature can lead to limited SQL Injections and subsequent data leakage. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "Cacti",
    "product": "cacti",
    "versions": [
      {
        "version": "< 1.2.25",
        "status": "affected"
      }
    ]
  }
]

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

44.9%