Bug ID | 1164675 |
---|---|
Summary | VUL-0: CVE-2020-8813: cacti: remote attackers may execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.1 |
Hardware | Other |
URL | https://smash.suse.de/issue/253575/ |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | nix@opensuse.org |
Reporter | atoptsoglou@suse.com |
QA Contact | security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
CVE-2020-8813 graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8813 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8813 https://github.com/Cacti/cacti/releases https://drive.google.com/file/d/1A8hxTyk_NgSp04zPX-23nPbsSDeyDFio/view https://gist.github.com/mhaskar/ebe6b74c32fd0f7e1eedf1aabfd44129 https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/