⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.
CVE-2020-8813 — OS Command Injection in Cacti
Severity
8.8HIGHNVD
EPSS
93.9%
top 0.12%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedFeb 22
Latest updateMay 24
Description
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages4 packages
Also affects: Debian Linux 10.0, Fedora 30, 31, 32
🔴Vulnerability Details
3💥Exploits & PoCs
6📋Vendor Advisories
1Debian▶
CVE-2020-8813: cacti - graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary O...↗2020
🕵️Threat Intelligence
2💬Community
4Bugzilla▶
CVE-2019-8813 webkitgtk: Incorrect state management leading to universal cross-site scripting↗2020-09-07
Bugzilla▶
CVE-2020-8813 cacti: remote code can be executed when guest users have access to realtime graphs [epel-all]↗2020-03-04
Bugzilla▶
CVE-2020-8813 cacti: remote code can be executed when guest users have access to realtime graphs [fedora-all]↗2020-03-04
Bugzilla▶
CVE-2020-8813 cacti: remote code can be executed when guest users have access to realtime graphs↗2020-03-04