CVE-2020-7237

NameCVE-2020-7237
DescriptionCacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh
Debian Bugs949997

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cacti (PTS)jessie0.8.8b+dfsg-8+deb8u6fixed
jessie (security)0.8.8b+dfsg-8+deb8u9fixed
stretch (security), stretch0.8.8h+ds1-10+deb9u1vulnerable
buster, buster (security)1.2.2+ds1-2+deb10u2vulnerable
bullseye, sid1.2.9+ds1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cactisource(unstable)1.2.9+ds1-1949997
cactisourcejessie(not affected)

Notes

[jessie] - cacti <not-affected> (Vulnerable code introduced later)
https://github.com/Cacti/cacti/issues/3201
https://github.com/Cacti/cacti/commit/5010719dbd160198be3e07bb994cf237e3af1308

Search for package or bug name: Reporting problems