Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, a SQL injection vulnerability in `automation_get_new_graphs_sql` function of `api_automation.php` allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. In `api_automation.php` line 856, the `get_request_var('filter')` is being concatenated into the SQL statement without any sanitization. In `api_automation.php` line 717, The filter of `'filter'` is `FILTER_DEFAULT`, which means there is no filter for it. Version 1.2.27 contains a patch for the issue.
References
Configurations
History
18 Dec 2024, 18:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L717 - Product | |
References | () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L856 - Product | |
References | () https://github.com/Cacti/cacti/commit/fd93c6e47651958b77c3bbe6a01fff695f81e886 - Patch | |
References | () https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc - Exploit, Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - Product | |
CPE | cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
|
First Time |
Fedoraproject fedora
Cacti Cacti cacti Fedoraproject |
21 Nov 2024, 09:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L717 - | |
References | () https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L856 - | |
References | () https://github.com/Cacti/cacti/commit/fd93c6e47651958b77c3bbe6a01fff695f81e886 - | |
References | () https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - |
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
14 May 2024, 15:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-14 15:25
Updated : 2024-12-18 18:29
NVD link : CVE-2024-31445
Mitre link : CVE-2024-31445
CVE.ORG link : CVE-2024-31445
JSON object : View
Products Affected
fedoraproject
- fedora
cacti
- cacti
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')