Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-49085SQL Injection in Cacti

CWE-89SQL Injection4 documents4 sources
Severity
8.8HIGHNVD
EPSS
91.4%
top 0.33%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 22

Description

Cacti provides an operational monitoring and fault management framework. In versions 1.2.25 and prior, it is possible to execute arbitrary SQL code through the `pollers.php` script. An authorized user may be able to execute arbitrary SQL code. The vulnerable component is the `pollers.php`. Impact of the vulnerability - arbitrary SQL code execution. As of time of publication, a patch does not appear to exist.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

debiandebian/cacti< cacti 1.2.24+ds1-1+deb12u2 (bookworm)
Debiancacti/cacti< 1.2.16+ds1-2+deb11u3+3
NVDcacti/cacti1.2.25

🔴Vulnerability Details

1
OSV
CVE-2023-49085: Cacti provides an operational monitoring and fault management framework2023-12-22

💥Exploits & PoCs

1
Metasploit
Cacti RCE via SQLi in pollers.php

📋Vendor Advisories

1
Debian
CVE-2023-49085: cacti - Cacti provides an operational monitoring and fault management framework. In vers...2023