Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29.
References
Link | Resource |
---|---|
https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0 | Patch |
https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36 | Exploit Vendor Advisory |
Configurations
History
04 Mar 2025, 14:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* | |
References | () https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36 - Exploit, Vendor Advisory | |
References | () https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0 - Patch | |
First Time |
Cacti
Cacti cacti |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
27 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-27 17:15
Updated : 2025-03-04 14:45
NVD link : CVE-2025-22604
Mitre link : CVE-2025-22604
JSON object : View
Products Affected
cacti
- cacti
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')