CVE-2024-31458

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `form_save()` function in `graph_template_inputs.php` is not thoroughly checked and is used to concatenate the SQL statement in `draw_nontemplated_fields_graph_item()` function from `lib/html_form_templates.php` , finally resulting in SQL injection. Version 1.2.27 contains a patch for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

18 Dec 2024, 20:47

Type Values Removed Values Added
References () https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x - () https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x - Exploit, Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - Product
First Time Fedoraproject fedora
Cacti
Cacti cacti
Fedoraproject
CPE cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

21 Nov 2024, 09:13

Type Values Removed Values Added
References () https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x - () https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ -

10 Jun 2024, 17:16

Type Values Removed Values Added
Summary
  • (es) Cacti proporciona un framework de monitoreo operativo y gestión de fallas. Antes de la versión 1.2.27, algunos de los datos almacenados en la función `form_save()` en `graph_template_inputs.php` no se verifican exhaustivamente y se usan para concatenar la instrucción SQL en la función `draw_nontemplate_fields_graph_item()` de `lib/html_form_templates. php`, lo que finalmente resulta en una inyección SQL. La versión 1.2.27 contiene un parche para el problema.
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ -

14 May 2024, 15:25

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 15:25

Updated : 2024-12-18 20:47


NVD link : CVE-2024-31458

Mitre link : CVE-2024-31458

CVE.ORG link : CVE-2024-31458


JSON object : View

Products Affected

fedoraproject

  • fedora

cacti

  • cacti
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')