CVE-2019-17358
Published: 12 December 2019
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP module.
Priority
Status
| Package | Release | Status |
|---|---|---|
|
cacti Launchpad, Ubuntu, Debian |
bionic |
Needed
|
| disco |
Ignored
(end of life)
|
|
| eoan |
Ignored
(end of life)
|
|
| focal |
Not vulnerable
(1.2.10+ds1-1ubuntu1)
|
|
| groovy |
Ignored
(end of life)
|
|
| hirsute |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
| impish |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
| jammy |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
| kinetic |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
| lunar |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
| mantic |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
| noble |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
| trusty |
Released
(0.8.8b+dfsg-5ubuntu0.2+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
| upstream |
Released
(0.8.8b+dfsg-8+deb8u8, 1.2.8+ds1-1)
|
|
| xenial |
Needed
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 8.1 |
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |