Cacti.graph_realtime.php.Remote.Command.Execution

description-logoDescription

This indicates an attack attempt to exploit a Command Injection Vulnerability in Cacti.
A remote, authenticated attacker could exploit this vulnerability by sending a crafted HTTP request. Successful exploitation could result in arbitrary system command execution under the context of the target system.

affected-products-logoAffected Products

Cacti 1.2.8

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Upgrade to the latest version available from the website.
https://www.cacti.net/download_cacti.php

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2022-05-04 20.309 Sig Added
2020-05-06 15.838 Default_action:pass:drop
2020-05-06 15.837 Default_action:drop:pass
2020-05-06 15.836 Default_action:pass:drop
2020-04-01 15.809