Cacti Log Poisoning Vulnerability Affects All Users, Upgrade to 1.2.28 Immediately
CVE-2024-43363

7.2HIGH

Key Information:

Vendor

Cacti

Status
Vendor
CVE Published:
7 October 2024

What is CVE-2024-43363?

A vulnerability exists in Cacti, an open source performance and fault management framework, where an admin user can create a device with a malicious hostname that contains PHP code. By manipulating the installation process, specifically completing only a particular step, an attacker can achieve log poisoning. This allows the PHP code to be logged and subsequently accessed via the log file URL, leading to potential remote code execution (RCE). This critical issue has been resolved in version 1.2.28, and it is strongly recommended that users update their installations immediately, as there are no known workarounds to mitigate the risk.

Affected Version(s)

cacti < 1.2.28

References

EPSS Score

43% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.