QID 150720

Date Published: 2023-09-27

QID 150720: Cacti Prior to 1.2.25 Multiple Security Vulnerabilities

Cacti is an open-source, web-based network monitoring and graphing tool designed as a front-end application for the open-source, industry-standard data logging tool RRDtool.

Cacti has been identified as having multiple security vulnerabilities.

CVE-2023-30534 : Insecure deserialization of filter data
CVE-2023-31132 : Privilege escalation when Cacti installed using Windows Installer defaults
CVE-2023-39357 : SQL Injection when saving data with sql_save()
CVE-2023-39358 : Authenticated SQL injection vulnerability when managing reports.
CVE-2023-39359 : Authenticated SQL injection vulnerability when managing graphs.
CVE-2023-39360 : Cross-Site Scripting vulnerability when creating new graphs.
CVE-2023-39361 : Unauthenticated SQL Injection when viewing graphs.
CVE-2023-39362 : Authenticated command injection when using SNMP options.
CVE-2023-39364 : Open redirect in change password functionality.
CVE-2023-39365 : SQL Injection when using regular expressions.
CVE-2023-39366 : Cross-Site Scripting vulnerability with Device Name when managing Data Sources.
CVE-2023-39510 : Cross-Site Scripting vulnerability with Device Name when administrating Reports.
CVE-2023-39511 : Cross-Site Scripting vulnerability with Device Name when editing Graphs whilst managing Reports.
CVE-2023-39512 : Cross-Site Scripting vulnerability with Device Name when managing Data Sources.
CVE-2023-39513 : Cross-Site Scripting vulnerability with Device Name when debugging data queries.
CVE-2023-39514 : Cross-Site Scripting vulnerability with Data Source Name when managing Graphs.
CVE-2023-39515 : Cross-Site Scripting vulnerability with Data Source Name when debugging Data Queries.
CVE-2023-39516 : Cross-Site Scripting vulnerability with Data Source Information when managing Data Sources.

Affected Versions:
Cacti prior to version 1.2.25

QID Detection Logic:
This QID sends a HTTP GET request and checks for vulnerable version of Cacti application running on the target server.

Exploiting all of these vulnerabilities successfully could grant an unauthenticated remote attacker the ability to take control of the cacti server.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Customers are advised to upgrade to Cacti 1.2.25 or later to remediate this vulnerabilities.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    CVE-2023-30534 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-77rf-774j-6h3p
    CVE-2023-31132 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-rf5w-pq3f-9876
    CVE-2023-39357 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-6jhp-mgqg-fhqg
    CVE-2023-39358 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g
    CVE-2023-39359 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h
    CVE-2023-39360 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-gx8c-xvjh-9qh4
    CVE-2023-39361 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg
    CVE-2023-39362 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp
    CVE-2023-39364 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-4pjv-rmrp-r59x
    CVE-2023-39365 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-v5w7-hww7-2f22
    CVE-2023-39366 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-rwhh-xxm6-vcrv
    CVE-2023-39510 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-24w4-4hp2-3j8h
    CVE-2023-39511 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-5hpr-4hhc-8q42
    CVE-2023-39512 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-vqcc-5v63-g9q7
    CVE-2023-39513 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-9fj7-8f2j-2rw2
    CVE-2023-39514 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-6hrc-2cfc-8hm7
    CVE-2023-39515 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h
    CVE-2023-39516 URL Logo github.com/Cacti/cacti/security/advisories/GHSA-r8qq-88g3-hmgv