Bug ID | 1224238 |
---|---|
Summary | VUL-0: CVE-2024-31459: cacti: file inclusion issue in the `lib/plugin.php` file |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.6 |
Hardware | Other |
URL | https://smash.suse.de/issue/405131/ |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | Andreas.Stieger@gmx.de |
Reporter | smash_bz@suse.de |
QA Contact | security-team@suse.de |
CC | camila.matos@suse.com |
Target Milestone | --- |
Found By | Security Response Team |
Blocker | --- |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php` file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the `api_plugin_hook()` function in the `lib/plugin.php` file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue. References: https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-31459 https://www.cve.org/CVERecord?id=CVE-2024-31459 https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r