Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-30534Deserialization of Untrusted Data in Cacti

Severity
4.3MEDIUMNVD
EPSS
48.5%
top 2.24%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 5

Description

Cacti is an open source operational monitoring and fault management framework. There are two instances of insecure deserialization in Cacti version 1.2.24. While a viable gadget chain exists in Cacti’s vendor directory (phpseclib), the necessary gadgets are not included, making them inaccessible and the insecure deserializations not exploitable. Each instance of insecure deserialization is due to using the unserialize function without sanitizing the user input. Cacti has a “safe” deserialization

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages3 packages

NVDcacti/cacti< 1.2.25
debiandebian/cacti< cacti 1.2.25+ds1-1 (forky)
Debiancacti/cacti< 1.2.25+ds1-1+1

Also affects: Fedora 37, 38

🔴Vulnerability Details

1
OSV
CVE-2023-30534: Cacti is an open source operational monitoring and fault management framework2023-09-05

💥Exploits & PoCs

1
Nuclei
Cacti < 1.2.25 Insecure Deserialization

📋Vendor Advisories

1
Debian
CVE-2023-30534: cacti - Cacti is an open source operational monitoring and fault management framework. T...2023