Total vulnerabilities in the database
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
Software | From | Fixed in |
---|---|---|
cacti / cacti | 1.2.8 | 1.2.8.x |