Search for packages
| purl | pkg:deb/debian/cacti@0?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-8max-2avj-hkdt | Cacti provides an operational monitoring and fault management framework. Version 1.2.25 has a Blind SQL Injection (SQLi) vulnerability within the SNMP Notification Receivers feature in the file `‘managers.php’`. An authenticated attacker with the “Settings/Utilities” permission can send a crafted HTTP GET request to the endpoint `‘/cacti/managers.php’` with an SQLi payload in the `‘selected_graphs_array’` HTTP GET parameter. As of time of publication, no patched versions exist. |
CVE-2023-51448
|
| VCID-a1a1-zuaj-mqaa | Cacti provides an operational monitoring and fault management framework. Versions of Cacti prior to 1.2.27 are vulnerable to stored cross-site scripting, a type of cross-site scripting where malicious scripts are permanently stored on a target server and served to users who access a particular page. Version 1.2.27 contains a patch for the issue. |
CVE-2024-27082
|
| VCID-a4qr-bw5v-t3hx | Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
CVE-2023-31132
|
| VCID-bzm7-peh5-nqba | Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc. |
CVE-2024-29895
|
| VCID-d7t8-6cty-sqde | Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
CVE-2023-39358
|
| VCID-du4b-tbxt-mqfr | Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The `data_sources.php` script displays the data source management information (e.g. data source path, polling configuration etc.) for different data visualizations of the _cacti_ app. CENSUS found that an adversary that is able to configure a malicious Device name, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http://<HOST>/cacti/host.php`, while the rendered malicious payload is exhibited at `http://<HOST>/cacti/data_sources.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output. |
CVE-2023-39366
|
| VCID-dup5-9qdp-5udn | Cacti through 1.2.29 allows SQL injection in the template function in host_templates.php via the graph_template parameter. NOTE: this issue exists because of an incomplete fix for CVE-2024-54146. |
CVE-2025-26520
|
| VCID-h6vp-37u4-b7f3 | Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
CVE-2023-39510
|
| VCID-hdjk-szxs-5bdu | Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
CVE-2020-14424
|
| VCID-mwbm-aphc-akgu | Cacti is an open source operational monitoring and fault management framework. A reflection cross-site scripting vulnerability was discovered in version 1.2.25. Attackers can exploit this vulnerability to perform actions on behalf of other users. The vulnerability is found in `templates_import.php.` When uploading an xml template file, if the XML file does not pass the check, the server will give a JavaScript pop-up prompt, which contains unfiltered xml template file name, resulting in XSS. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. As of time of publication, no patched versions are available. |
CVE-2023-50250
|
| VCID-myxu-h49e-77f1 | In csrf-magic before 1.0.4, if $GLOBALS['csrf']['secret'] is not configured, the Anti-CSRF Token used is predictable and would permit an attacker to bypass the CSRF protections, because an automatically generated secret is not used. |
CVE-2013-7464
|
| VCID-w11p-1pr3-7ybp | Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
CVE-2023-39511
|
| VCID-y4py-r1dd-9bcu | Cacti provides an operational monitoring and fault management framework. Versions of Cacti prior to 1.2.27 contain a residual cross-site scripting vulnerability caused by an incomplete fix for CVE-2023-50250. `raise_message_javascript` from `lib/functions.php` now uses purify.js to fix CVE-2023-50250 (among others). However, it still generates the code out of unescaped PHP variables `$title` and `$header`. If those variables contain single quotes, they can be used to inject JavaScript code. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. Version 1.2.27 fixes this issue. |
CVE-2024-29894
|
| VCID-ye6u-vkxs-w7fz | Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the template function of host_templates.php using the graph_template parameter. This vulnerability is fixed in 1.2.29. |
CVE-2024-54146
|
| VCID-yp44-k5kc-kqbd | Cacti provides an operational monitoring and fault management framework. A reflected cross-site scripting vulnerability on the 1.3.x DEV branch allows attackers to obtain cookies of administrator and other users and fake their login using obtained cookies. This issue is fixed in commit a38b9046e9772612fda847b46308f9391a49891e. |
CVE-2024-30268
|
| VCID-zf92-pzgz-dfg7 | Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
CVE-2023-39512
|
| VCID-znew-xktt-p7hy | Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
CVE-2023-39514
|