Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php` file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the `api_plugin_hook()` function in the `lib/plugin.php` file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Cacti RCE vulnerability by file include in lib/plugin.php | Cacti RCE vulnerability by file include in lib/plugin.php |
Wed, 18 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fedoraproject
Fedoraproject fedora |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
|
Vendors & Products |
Fedoraproject
Fedoraproject fedora |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:47:56.727Z
Reserved: 2024-04-03T17:55:32.647Z
Link: CVE-2024-31459

Updated: 2024-08-02T01:52:57.038Z

Status : Analyzed
Published: 2024-05-14T15:25:26.110
Modified: 2024-12-18T20:49:57.357
Link: CVE-2024-31459

No data.