Bug 2237587 (CVE-2023-39359) - CVE-2023-39359 cacti: Authenticated SQL injection vulnerability when managing graphs
Summary: CVE-2023-39359 cacti: Authenticated SQL injection vulnerability when managing...
Keywords:
Status: NEW
Alias: CVE-2023-39359
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2237588 2237589
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-09-06 05:08 UTC by Avinash Hanwate
Modified: 2023-09-06 05:09 UTC (History)
0 users

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2023-09-06 05:08:52 UTC
Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `graphs.php` file. When dealing with the cases of ajax_hosts and ajax_hosts_noany, if the `site_id` parameter is greater than 0, it is directly reflected in the WHERE clause of the SQL statement. This creates an SQL injection vulnerability. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

https://github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h

Comment 1 Avinash Hanwate 2023-09-06 05:09:17 UTC
Created cacti tracking bugs for this issue:

Affects: epel-all [bug 2237589]
Affects: fedora-all [bug 2237588]


Note You need to log in before you can comment on or make changes to this bug.