Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2023-30534 — Deserialization of Untrusted Data in Cacti
Severity
4.3MEDIUMNVD
EPSS
48.5%
top 2.24%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 5
Description
Cacti is an open source operational monitoring and fault management framework. There are two instances of insecure deserialization in Cacti version 1.2.24. While a viable gadget chain exists in Cacti’s vendor directory (phpseclib), the necessary gadgets are not included, making them inaccessible and the insecure deserializations not exploitable. Each instance of insecure deserialization is due to using the unserialize function without sanitizing the user input. Cacti has a “safe” deserialization…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4
Affected Packages3 packages
Also affects: Fedora 37, 38
🔴Vulnerability Details
1OSV▶
CVE-2023-30534: Cacti is an open source operational monitoring and fault management framework↗2023-09-05
💥Exploits & PoCs
1Nuclei▶
Cacti < 1.2.25 Insecure Deserialization
📋Vendor Advisories
1Debian▶
CVE-2023-30534: cacti - Cacti is an open source operational monitoring and fault management framework. T...↗2023