QID 730703

Date Published: 2023-01-19

QID 730703: Cacti Unauthenticated Command Injection Vulnerability

A command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device.

Affected Version:
Cacti v1.2.22

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable cacti version by fetching the version from index.php.

Note: This QID can only check default directories (/, /cacti/) to fetch the cacti version. It is not feasible to bruteforce directories to fetch the version.

Successful exploitation of the vulnerability may allow unauthenticated attacker to execute arbitrary code remotely.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Vendor has released patch, customers are advised to upgrade to Cacti 1.2.23, 1.3.0 or later. For more information please refer to GHSA-6p93-p743-35gf

    CVEs related to QID 730703

    Software Advisories
    Advisory ID Software Component Link
    GHSA-6p93-p743-35gf URL Logo github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf