Description
Cacti versions prior to 0.8.6-d contain a remote command execution vulnerability in the graph_view.php script. An authenticated user can inject arbitrary shell commands via the graph_start GET parameter, which is improperly handled during graph rendering. This flaw allows attackers to execute commands on the underlying operating system with the privileges of the web server process, potentially compromising system integrity.
Problem types
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
* before 0.8.6-d
Credits
David Maciejak
References
raw.githubusercontent.com/...webapp/cacti_graphimage_exec.rb
www.exploit-db.com/exploits/9911
www.exploit-db.com/exploits/16881
www.cacti.net/info/downloads
web.archive.org/.../http://www.cacti.net/cactid_download.php
www.vulncheck.com/advisories/cacti-graph-view-rce