UBUNTU-CVE-2017-16660

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2017-16660
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-16660.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-16660
Related
Published
2017-11-08T05:29:00Z
Modified
2017-11-08T05:29:00Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header.

References

Affected packages

Ubuntu:18.04:LTS / cacti

Package

Name
cacti
Purl
pkg:deb/ubuntu/cacti@1.1.38+ds1-1?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.38+ds1-1

Affected versions

1.*

1.1.18+ds1-1
1.1.27+ds1-2
1.1.27+ds1-3
1.1.28+ds1-2
1.1.35+ds1-1
1.1.36+ds1-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "cacti": "1.1.38+ds1-1"
        }
    ]
}