CVE-2020-7237 PUBLISHED

Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.

EPSS 46.81% · 97.6th percentile

Risk Scores

EPSS Score
46.81%
97.6th percentile

Affected Products

VendorProductVersions
Ubuntu:Pro:18.04:LTScacti1.1.38+ds1-1ubuntu0.1~esm4, 1.1.38+ds1-1ubuntu0.1~esm3, 1.1.28+ds1-2
Ubuntu:Pro:16.04:LTScacti0.8.8f+ds1-4ubuntu4.16.04.2+esm1, 0.8.8f+ds1-4ubuntu4.16.04.2+esm2, 0.8.8f+ds1-4ubuntu4.16.04
Ubuntu:Pro:14.04:LTScacti0, 0.8.8b+dfsg-5ubuntu0.2+esm2, 0.8.8b+dfsg-5ubuntu0.2+esm1

Timeline

References

Open in Interactive Console →