CVE-2024-31459

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php` file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the `api_plugin_hook()` function in the `lib/plugin.php` file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue.
PHP Remote File Inclusion
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8 HIGH
NETWORK
HIGH
HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
GitHub_MCNA
8.1 HIGH
NETWORK
HIGH
HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
VendorProductVersion
cacticacti
𝑥
< 1.2.27
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
cacti
bullseye
vulnerable
bullseye (security)
1.2.16+ds1-2+deb11u5
fixed
bookworm
1.2.24+ds1-1+deb12u5
fixed
bookworm (security)
1.2.24+ds1-1+deb12u5
fixed
sid
1.2.30+ds1-1
fixed
trixie
1.2.30+ds1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cacti
noble
Fixed 1.2.26+ds1-1ubuntu0.1
released
mantic
ignored
jammy
Fixed 1.2.19+ds1-2ubuntu1.1
released
focal
Fixed 1.2.10+ds1-1ubuntu1.1
released
bionic
Fixed 1.1.38+ds1-1ubuntu0.1~esm3
released
xenial
Fixed 0.8.8f+ds1-4ubuntu4.16.04.2+esm2
released
trusty
Fixed 0.8.8b+dfsg-5ubuntu0.2+esm2
released