[Bug 1164675] New: VUL-0: CVE-2020-8813: cacti: remote attackers may execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege
http://bugzilla.opensuse.org/show_bug.cgi?id=1164675 Bug ID: 1164675 Summary: VUL-0: CVE-2020-8813: cacti: remote attackers may execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.1 Hardware: Other URL: https://smash.suse.de/issue/253575/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: nix@opensuse.org Reporter: atoptsoglou@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2020-8813 graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8813 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8813 https://github.com/Cacti/cacti/releases https://drive.google.com/file/d/1A8hxTyk_NgSp04zPX-23nPbsSDeyDFio/view https://gist.github.com/mhaskar/ebe6b74c32fd0f7e1eedf1aabfd44129 https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1164675 Andreas Stieger <Andreas.Stieger@gmx.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |IN_PROGRESS CC| |Andreas.Stieger@gmx.de, | |nix@opensuse.org Assignee|nix@opensuse.org |security-team@suse.de -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com