Cacti Patches SQL Injection Vulnerability in Version 1.2.27
CVE-2024-31458

4.6MEDIUM

Key Information:

Vendor

Cacti

Status
Vendor
CVE Published:
14 May 2024

What is CVE-2024-31458?

The Cacti Monitoring Framework has a vulnerability stemming from insufficient validation of input data in the form_save() function within the graph_template_inputs.php file. This oversight occurs prior to version 1.2.27, allowing crafted input to manipulate SQL queries in the draw_nontemplated_fields_graph_item() function found in lib/html_form_templates.php. As a result, attackers can potentially exploit this flaw to execute unauthorized SQL commands, compromising the integrity of the database. It is crucial for users of affected versions to upgrade to version 1.2.27 or later, which addresses this security issue, to ensure protection against such SQL injection attacks. For detailed information, refer to the advisory on GitHub.

Affected Version(s)

cacti < 1.2.27

References

CVSS V3.1

Score:
4.6
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.