Local File Inclusion (RCE) in Cacti
CVE-2023-49084

8.1HIGH

Key Information:

Vendor

Cacti

Status
Vendor
CVE Published:
21 December 2023

Badges

👾 Exploit Exists🟡 Public PoC🟣 EPSS 88%

What is CVE-2023-49084?

The Cacti performance management framework is vulnerable to an SQL Injection issue, allowing unauthorized code execution on the server. This vulnerability arises from insufficient handling of the include file path within the 'link.php' component. An attacker with authorized access could exploit this weakness to execute arbitrary code, posing significant risks to the integrity and availability of the server hosting Cacti.

Affected Version(s)

cacti = 1.2.25

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

88% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-49084 : Local File Inclusion (RCE) in Cacti