Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-31459
HistoryMay 13, 2024 - 3:11 p.m.

CVE-2024-31459 Cacti RCE vulnerability by file include in lib/plugin.php

2024-05-1315:11:37
CWE-98
GitHub_M
github.com
2
cacti
rce vulnerability
file inclusion
sql injection
version 1.2.27

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

8.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the lib/plugin.php file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the api_plugin_hook() function in the lib/plugin.php file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue.

CNA Affected

[
  {
    "vendor": "Cacti",
    "product": "cacti",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.2.27"
      }
    ]
  }
]

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

8.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%