CVE-2024-31445

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, a SQL injection vulnerability in `automation_get_new_graphs_sql` function of `api_automation.php` allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. In `api_automation.php` line 856, the `get_request_var('filter')` is being concatenated into the SQL statement without any sanitization. In `api_automation.php` line 717, The filter of `'filter'` is `FILTER_DEFAULT`, which means there is no filter for it. Version 1.2.27 contains a patch for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

18 Dec 2024, 18:29

Type Values Removed Values Added
References () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L717 - () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L717 - Product
References () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L856 - () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L856 - Product
References () https://github.com/Cacti/cacti/commit/fd93c6e47651958b77c3bbe6a01fff695f81e886 - () https://github.com/Cacti/cacti/commit/fd93c6e47651958b77c3bbe6a01fff695f81e886 - Patch
References () https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc - () https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc - Exploit, Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - Product
CPE cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
First Time Fedoraproject fedora
Cacti
Cacti cacti
Fedoraproject

21 Nov 2024, 09:13

Type Values Removed Values Added
References () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L717 - () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L717 -
References () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L856 - () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L856 -
References () https://github.com/Cacti/cacti/commit/fd93c6e47651958b77c3bbe6a01fff695f81e886 - () https://github.com/Cacti/cacti/commit/fd93c6e47651958b77c3bbe6a01fff695f81e886 -
References () https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc - () https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ -

10 Jun 2024, 17:16

Type Values Removed Values Added
Summary
  • (es) Cacti proporciona un framework de monitoreo operativo y gestión de fallas. Antes de la versión 1.2.27, una vulnerabilidad de inyección SQL en la función `automation_get_new_graphs_sql` de `api_automation.php` permitía a los usuarios autenticados explotar estas vulnerabilidades de inyección SQL para realizar escalada de privilegios y ejecución remota de código. En la línea 856 de `api_automation.php`, `get_request_var('filter')` se concatena en la declaración SQL sin ningún tipo de sanitización. En `api_automation.php` línea 717, el filtro de ``filtro'' es `FILTER_DEFAULT`, lo que significa que no hay ningún filtro para él. La versión 1.2.27 contiene un parche para el problema.
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ -

14 May 2024, 15:25

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 15:25

Updated : 2024-12-18 18:29


NVD link : CVE-2024-31445

Mitre link : CVE-2024-31445

CVE.ORG link : CVE-2024-31445


JSON object : View

Products Affected

fedoraproject

  • fedora

cacti

  • cacti
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')