Name | CVE-2023-46490 |
Description | SQL Injection vulnerability in Cacti v1.2.25 allows a remote attacker to obtain sensitive information via the form_actions() function in the managers.php function. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
cacti (PTS) | buster | 1.2.2+ds1-2+deb10u4 | vulnerable |
| buster (security) | 1.2.2+ds1-2+deb10u5 | vulnerable |
| bullseye | 1.2.16+ds1-2+deb11u1 | vulnerable |
| bullseye (security) | 1.2.16+ds1-2+deb11u2 | vulnerable |
| bookworm | 1.2.24+ds1-1 | vulnerable |
| bookworm (security) | 1.2.24+ds1-1+deb12u1 | vulnerable |
| sid, trixie | 1.2.25+ds1-2 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
cacti | source | (unstable) | (unfixed) | | | |
Notes
[bookworm] - cacti <no-dsa> (Revisit when more details are available)
[bullseye] - cacti <no-dsa> (Revisit when more details are available)
https://github.com/Cacti/cacti/security/advisories/GHSA-f4r3-53jr-654c (not public yet)
https://gist.github.com/ISHGARD-2/a95632111138fcd7ccf7432ccb145b53