A blind SQL injection vulnerability in Cacti, a widely-used network monitoring, performance and fault management framework, could lead to information disclosure and potentially remote code execution.
Cacti is often used in network operation centers of telecoms and web hosting providers, to collect network performance data and store it in RRDtool, a logging and graphing database and system that, through a web interface, creates graphical representations of the collected data.
CVE-2023-51448 is a vulnerability within Cacti's SNMP Notification Receivers feature that could allow a threat actor to disclose all Cacti database contents or, depending on the database configuration, even trigger remote code execution.
The vulnerability, which affects versions 1.2.25, was discovered by Synopsys researcher Matthew Hogg and has been fixed by the maintainers in late December 2023.
A year ago, internet-exposed Cacti servers were targeted by attackers wielding an exploit for CVE-2022-46169, a critical command injection flaw that could be exploited remotely by unauthenticated users.
To exploit CVE-2023-51448 they must have access to an account with specific permissions or leverage another vulnerability to bypass the authentication requirement.
There is currently no indication that the vulnerability is being exploited in the wild.
Cacti users are advised to upgrade to version 1.2.26, which fixed this and other vulnerabilities.
This Cyber News was published on www.helpnetsecurity.com. Publication date: Tue, 09 Jan 2024 12:13:05 +0000