Bug ID 1224238
Summary VUL-0: CVE-2024-31459: cacti: file inclusion issue in the `lib/plugin.php` file
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/405131/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee Andreas.Stieger@gmx.de
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC camila.matos@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

Cacti provides an operational monitoring and fault management framework. Prior
to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php`
file. Combined with SQL injection vulnerabilities, remote code execution can be
implemented. There is a file inclusion issue with the `api_plugin_hook()`
function in the `lib/plugin.php` file, which reads the plugin_hooks and
plugin_config tables in database. The read data is directly used to concatenate
the file path which is used for file inclusion. Version 1.2.27 contains a patch
for the issue.

References:
https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-31459
https://www.cve.org/CVERecord?id=CVE-2024-31459
https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv
https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r


You are receiving this mail because: