Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-39358


Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `reports_user.php` file. In `ajax_get_branches`, the `tree_id` parameter is passed to the `reports_get_branch_select` function without any validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.


Published

2023-09-05T22:15:08.733

Last Modified

2024-11-21T08:15:13.997

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

Weaknesses
  • Type: Primary
    CWE-89

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cacti cacti < 1.2.25 Yes
Operating System fedoraproject fedora 37 Yes
Operating System fedoraproject fedora 38 Yes

References