Name | CVE-2025-24368 |
Description | Cacti is an open source performance and fault management framework. Some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in build_rule_item_filter() function from lib/api_automation.php, resulting in SQL injection. This vulnerability is fixed in 1.2.29. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-4048-1, DSA-5862-1 |
Debian Bugs | 1094574 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
cacti (PTS) | bullseye | 1.2.16+ds1-2+deb11u3 | vulnerable |
bullseye (security) | 1.2.16+ds1-2+deb11u5 | fixed | |
bookworm | 1.2.24+ds1-1+deb12u4 | vulnerable | |
bookworm (security) | 1.2.24+ds1-1+deb12u5 | fixed | |
sid, trixie | 1.2.28+ds1-4 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
cacti | source | bullseye | 1.2.16+ds1-2+deb11u5 | DLA-4048-1 | ||
cacti | source | bookworm | 1.2.24+ds1-1+deb12u5 | DSA-5862-1 | ||
cacti | source | (unstable) | 1.2.28+ds1-4 | 1094574 |
https://github.com/Cacti/cacti/security/advisories/GHSA-f9c7-7rc3-574c
Backend fixed by: https://github.com/Cacti/cacti/commit/8b516cb9a73322ad532231e74000c2ee097b495e (release/1.2.27)
Frontend fixed by: https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0 (release/1.2.29)
Frontend follow-up #1: https://github.com/Cacti/cacti/commit/94526a92b96c01848748602977819cd403932f0a (1.2.x)
Frontend regression: https://github.com/Cacti/cacti/issues/6090
Frontend fix optional: https://github.com/Cacti/cacti/pull/6094#issuecomment-2643321503