CVE-2024-31459

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-31459
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-31459.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-31459
Aliases
Related
Published
2024-05-14T15:25:26Z
Modified
2024-09-11T05:11:52.952874Z
Summary
[none]
Details

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the lib/plugin.php file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the api_plugin_hook() function in the lib/plugin.php file, which reads the pluginhooks and pluginconfig tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue.

References

Affected packages

Debian:11 / cacti

Package

Name
cacti
Purl
pkg:deb/debian/cacti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.16+ds1-2+deb11u4

Affected versions

1.*

1.2.16+ds1-2
1.2.16+ds1-2+deb11u1
1.2.16+ds1-2+deb11u2
1.2.16+ds1-2+deb11u3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / cacti

Package

Name
cacti
Purl
pkg:deb/debian/cacti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.24+ds1-1+deb12u3

Affected versions

1.*

1.2.24+ds1-1
1.2.24+ds1-1+deb12u1
1.2.24+ds1-1+deb12u2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / cacti

Package

Name
cacti
Purl
pkg:deb/debian/cacti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.27+ds1-1

Affected versions

1.*

1.2.24+ds1-1
1.2.25+ds1-1
1.2.25+ds1-2
1.2.26+ds1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}