Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
References
Configurations
History
No history.
Information
Published : 2020-01-20 05:15
Updated : 2023-11-07 03:25
NVD link : CVE-2020-7237
Mitre link : CVE-2020-7237
CVE.ORG link : CVE-2020-7237
JSON object : View
Products Affected
cacti
- cacti
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')