Upstream information

CVE-2024-31445 at MITRE

Description

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, a SQL injection vulnerability in `automation_get_new_graphs_sql` function of `api_automation.php` allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. In `api_automation.php` line 856, the `get_request_var('filter')` is being concatenated into the SQL statement without any sanitization. In `api_automation.php` line 717, The filter of `'filter'` is `FILTER_DEFAULT`, which means there is no filter for it. Version 1.2.27 contains a patch for the issue.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

SUSE Bugzilla entry: 1224237 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 12
  • cacti >= 1.2.27-41.1
  • cacti-spine >= 1.2.27-35.1
Patchnames:
openSUSE-2024-274
SUSE Package Hub 15 SP5
  • cacti >= 1.2.27-bp155.2.9.1
  • cacti-spine >= 1.2.27-bp155.2.9.1
Patchnames:
openSUSE-2024-274
SUSE Package Hub 15 SP6
  • cacti >= 1.2.27-bp156.2.3.1
  • cacti-spine >= 1.2.27-bp156.2.3.1
Patchnames:
openSUSE-2024-276
openSUSE Leap 15.5
  • cacti >= 1.2.27-bp155.2.9.1
  • cacti-spine >= 1.2.27-bp155.2.9.1
Patchnames:
openSUSE-2024-274
openSUSE Leap 15.6
  • cacti >= 1.2.27-bp156.2.3.1
  • cacti-spine >= 1.2.27-bp156.2.3.1
Patchnames:
openSUSE-2024-276
openSUSE Tumbleweed
  • cacti >= 1.2.27-1.1
Patchnames:
openSUSE-Tumbleweed-2024-13962


SUSE Timeline for this CVE

CVE page created: Tue May 14 18:12:48 2024
CVE page last modified: Tue Sep 3 19:34:27 2024