CVE-2020-7237
20.01.2020, 05:15
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
| Vendor | Product | Version |
|---|---|---|
| cacti | cacti | 1.2.8 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
References