Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
The Cacti Group
The Cacti Group cacti |
|
CPEs | cpe:2.3:a:the_cacti_group:cacti:*:*:*:*:*:*:*:* | |
Vendors & Products |
The Cacti Group
The Cacti Group cacti |
|
Metrics |
ssvc
|
Wed, 18 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cacti
Cacti cacti Fedoraproject Fedoraproject fedora |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
|
Vendors & Products |
Cacti
Cacti cacti Fedoraproject Fedoraproject fedora |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:40:51.979Z
Reserved: 2024-02-08T22:26:33.514Z
Link: CVE-2024-25641

Updated: 2024-08-01T23:44:09.935Z

Status : Analyzed
Published: 2024-05-14T15:05:50.423
Modified: 2024-12-18T20:54:30.227
Link: CVE-2024-25641

No data.