Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2024-31460

Published: 14 May 2024

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `automation_tree_rules.php` is not thoroughly checked and is used to concatenate the SQL statement in `create_all_header_nodes()` function from `lib/api_automation.php` , finally resulting in SQL injection. Using SQL based secondary injection technology, attackers can modify the contents of the Cacti database, and based on the modified content, it may be possible to achieve further impact, such as arbitrary file reading, and even remote code execution through arbitrary file writing. Version 1.2.27 contains a patch for the issue.

Priority

Medium

Status

Package Release Status
cacti
Launchpad, Ubuntu, Debian
bionic
Released (1.1.38+ds1-1ubuntu0.1~esm3)
Available with Ubuntu Pro
focal
Released (1.2.10+ds1-1ubuntu1.1)
jammy
Released (1.2.19+ds1-2ubuntu1.1)
mantic Ignored
(end of life, was needs-triage)
noble
Released (1.2.26+ds1-1ubuntu0.1)
trusty Not vulnerable
(code not exist)
upstream Needs triage

xenial Not vulnerable
(code not exist)