Upstream information

CVE-2020-7237 at MITRE

Description

Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having critical severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 9
Vector AV:N/AC:L/Au:S/C:C/I:C/A:C
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
CVSS v3 Scores
  National Vulnerability Database
Base Score 8.8
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Access Vector Network
Access Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1161297 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub for SUSE Linux Enterprise 12
  • cacti >= 1.2.11-5.1
  • cacti-spine >= 1.2.11-2.1
  • cacti-spine-debuginfo >= 1.2.11-2.1
  • cacti-spine-debugsource >= 1.2.11-2.1
Patchnames:
openSUSE-2020-558
openSUSE Leap 15.1
  • cacti >= 1.2.11-lp151.3.6.1
  • cacti-spine >= 1.2.11-lp151.3.6.1
  • cacti-spine-debuginfo >= 1.2.11-lp151.3.6.1
  • cacti-spine-debugsource >= 1.2.11-lp151.3.6.1
Patchnames:
openSUSE-2020-272
openSUSE-2020-558