Bug ID 1231370
Summary VUL-0: CVE-2024-43363: cacti: Remote code execution via Log Poisoning in Cacti
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/423123/
OS Other
Status NEW
Severity Major
Priority P5 - None
Component Security
Assignee nix@opensuse.org
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC stoyan.manolov@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

Cacti is an open source performance and fault management framework. An admin
user can create a device with a malicious hostname containing php code and
repeat the installation process (completing only step 5 of the installation
process is enough, no need to complete the steps before or after it) to use a
php file as the cacti log file. After having the malicious hostname end up in
the logs (log poisoning), one can simply go to the log file url to execute
commands to achieve RCE. This issue has been addressed in version 1.2.28 and
all users are advised to upgrade. There are no known workarounds for this
vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-43363
https://www.cve.org/CVERecord?id=CVE-2024-43363
https://github.com/Cacti/cacti/security/advisories/GHSA-gxq4-mv8h-6qj4
https://bugzilla.redhat.com/show_bug.cgi?id=2317073


You are receiving this mail because: