Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2020-7237
Description:Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
Test IDs: None available
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2020-7237
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUSOTOIEJKD2IWJHN7TY56TDZJQZJUVJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLZAMGTW2OSIBLYLXWHQBGWP7M4DTRS7/
https://security.gentoo.org/glsa/202003-40
https://ctrsec.io/index.php/2020/01/25/cve-2020-7237-remote-code-execution-in-cacti-rrdtool/
https://github.com/Cacti/cacti/issues/3201
SuSE Security Announcement: openSUSE-SU-2020:0272 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html
SuSE Security Announcement: openSUSE-SU-2020:0284 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html
SuSE Security Announcement: openSUSE-SU-2020:0558 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html
SuSE Security Announcement: openSUSE-SU-2020:0565 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html




© 1998-2021 E-Soft Inc. All rights reserved.