Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-31132— Cacti Privilege Escalation

CVSS 7.8 · High EPSS 0.12% · P30
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-31132

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cacti Privilege Escalation
Source: NVD (National Vulnerability Database)
Vulnerability Description
Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a privilege escalation vulnerability. A low-privileged OS user with access to a Windows host where Cacti is installed can create arbitrary PHP files in a web document directory. The user can then execute the PHP files under the security context of SYSTEM. This allows an attacker to escalate privilege from a normal user account to SYSTEM. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键功能的认证机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cacti 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cacti是Cacti团队的一套开源的网络流量监测和分析工具。该工具通过snmpget来获取数据,使用RRDtool绘画图形进行分析,并提供数据和用户管理功能。 Cacti 1.2.25之前版本存在访问控制错误漏洞,该漏洞源于存在权限提升漏洞,低权限操作系统用户可以在Web文档目录中创建并执行任意PHP文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Cacticacti < 1.2.25 -

II. Public POCs for CVE-2023-31132

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-31132

登录查看更多情报信息。

Same Patch Batch · Cacti · 2023-09-05 · 17 CVEs total

CVE-2023-393619.8 CRITICALUnauthenticated SQL Injection in graph_view.php in Cacti
CVE-2023-393598.8 HIGHAuthenticated SQL injection vulnerability in graphs.php in Cacti
CVE-2023-393588.8 HIGHAuthenticated SQL injection vulnerability in reports_user.php in Cacti
CVE-2023-393578.8 HIGHA Defect in sql_save() Causes Multiple SQL Injection Vulnerabilities in Cacti
CVE-2023-393627.2 HIGHAuthenticated command injection in SNMP options of a Device
CVE-2023-395156.1 MEDIUMStored Cross-site Scripting on data_debug.php datasource path view in Cacti
CVE-2023-395146.1 MEDIUMStored Cross-site Scripting on graphs.php data template formated name view in Cacti
CVE-2023-395136.1 MEDIUMStored Cross-site Scripting on host.php verbose data-query debug view in Cacti
CVE-2023-395126.1 MEDIUMStored Cross-site Scripting on data_sources.php device name view in Cacti
CVE-2023-395106.1 MEDIUMStored Cross-site Scripting in reports_admin.php through Device-Name in 'select' input in
CVE-2023-393666.1 MEDIUMStored Cross-site Scripting in data_sources.php through Device-Name in 'select' input in C
CVE-2023-393606.1 MEDIUMReflected Cross-site Scripting in graphs_new.php in Cacti
CVE-2023-395166.1 MEDIUMStored Cross-Site-Scripting on data_sources.php debug html-block in Cacti
CVE-2023-393654.6 MEDIUMUnchecked regular expressions can lead to SQL Injection and data leakage in Cacti
CVE-2023-305344.3 MEDIUMInsecure Deserialization in Cacti
CVE-2023-393643.5 LOWOpen redirect in change password functionality in Cacti

IV. Related Vulnerabilities

V. Comments for CVE-2023-31132

No comments yet


Leave a comment