CVE-2020-7237

Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
OS Command Injection
Severity
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Atk. Vector
NETWORK
Atk. Complexity
LOW
Priv. Required
LOW
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
VendorProductVersion
cacticacti
1.2.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
cacti
bullseye (security)
1.2.16+ds1-2+deb11u3
fixed
bullseye
1.2.16+ds1-2+deb11u3
fixed
stretch
not-affected
jessie
not-affected
bookworm
1.2.24+ds1-1+deb12u2
fixed
bookworm (security)
1.2.24+ds1-1+deb12u2
fixed
sid
1.2.27+ds1-2
fixed
trixie
1.2.27+ds1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cacti
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
ignored
disco
ignored
bionic
needed
xenial
needed
trusty
needs-triage