2025-03-16 03:03:50 +00:00

109 lines
3.7 KiB
JSON

{
"id": "CVE-2025-22604",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-27T17:15:17.307",
"lastModified": "2025-03-04T16:54:45.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29."
},
{
"lang": "es",
"value": "Cacti es un sistema de gesti\u00f3n de errores y rendimiento de c\u00f3digo abierto framework. Debido a una falla en el analizador de resultados SNMP de varias l\u00edneas, los usuarios autenticados pueden inyectar OID mal formados en la respuesta. Cuando se procesan mediante ss_net_snmp_disk_io() o ss_net_snmp_disk_bytes(), una parte de cada OID se utilizar\u00e1 como clave en una matriz que se utiliza como parte de un comando sistema, lo que provoca una vulnerabilidad de ejecuci\u00f3n de comandos. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.2.29."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.29",
"matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}