CVE-2020-7237

EUVD-2020-28365
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
Affected Products (NVD)
VendorProductVersion
cacticacti
1.2.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
cacti
102
105
102
105
102
105
102
105
110
111
102
105
110
111
102
105
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cacti
110
101
105
103
105
103
110
111
110
111
110
111
110
111
110
111
110
111
110
111
110
111
110
111
110
101
110
101