CVE-2024-45598

NameCVE-2024-45598
DescriptionCacti is an open source performance and fault management framework. Prior to 1.2.29, an administrator can change the `Poller Standard Error Log Path` parameter in either Installation Step 5 or in Configuration->Settings->Paths tab to a local file inside the server. Then simply going to Logs tab and selecting the name of the local file will show its content on the web UI. This vulnerability is fixed in 1.2.29.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1094574

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cacti (PTS)bullseye1.2.16+ds1-2+deb11u3vulnerable
bullseye (security)1.2.16+ds1-2+deb11u4vulnerable
bookworm1.2.24+ds1-1+deb12u4vulnerable
bookworm (security)1.2.24+ds1-1+deb12u2vulnerable
trixie1.2.28+ds1-3vulnerable
sid1.2.28+ds1-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cactisource(unstable)1.2.28+ds1-41094574

Notes

https://github.com/Cacti/cacti/security/advisories/GHSA-pv2c-97pp-vxwg
Fixed by: https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0
Fixed by: https://github.com/Cacti/cacti/commit/eca52c6bb3e76c55d66b1040baa6dbf37471a0ae

Search for package or bug name: Reporting problems