Cacti vulnerable to SQL injection and privilege escalation
CVE-2024-31445
What is CVE-2024-31445?
Cacti, a widely used operational monitoring and fault management framework, is vulnerable to SQL injection attacks due to improper handling of user input in the api_automation.php
file. Specifically, the automation_get_new_graphs_sql
function concatenates input directly into an SQL query without sanitization checks, exposing systems to potential privilege escalation and remote code execution by authenticated users. The flawed implementation occurs because the filter
variable is processed with FILTER_DEFAULT
, which allows unfiltered input. Users are advised to upgrade to version 1.2.27 or later, wherein a patch has been introduced to rectify this vulnerability.
Affected Version(s)
cacti < 1.2.27
References
EPSS Score
8% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved