SQL Injection Affecting cacti package, versions <1.2.27+ds1-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.07% (32nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN13-CACTI-6839378
  • published14 May 2024
  • disclosed14 May 2024

Introduced: 14 May 2024

CVE-2024-31445  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade Debian:13 cacti to version 1.2.27+ds1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cacti package and not the cacti package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, a SQL injection vulnerability in automation_get_new_graphs_sql function of api_automation.php allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. In api_automation.php line 856, the get_request_var(&#39;filter&#39;) is being concatenated into the SQL statement without any sanitization. In api_automation.php line 717, The filter of &#39;filter&#39; is FILTER_DEFAULT, which means there is no filter for it. Version 1.2.27 contains a patch for the issue.

CVSS Scores

version 3.1