2024-06-10 18:03:10 +00:00

67 lines
3.2 KiB
JSON

{
"id": "CVE-2024-31460",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-14T15:25:26.897",
"lastModified": "2024-06-10T17:16:26.390",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `automation_tree_rules.php` is not thoroughly checked and is used to concatenate the SQL statement in `create_all_header_nodes()` function from `lib/api_automation.php` , finally resulting in SQL injection. Using SQL based secondary injection technology, attackers can modify the contents of the Cacti database, and based on the modified content, it may be possible to achieve further impact, such as arbitrary file reading, and even remote code execution through arbitrary file writing. Version 1.2.27 contains a patch for the issue."
},
{
"lang": "es",
"value": "Cacti proporciona un framework de monitoreo operativo y gesti\u00f3n de fallas. Antes de la versi\u00f3n 1.2.27, algunos de los datos almacenados en `automation_tree_rules.php` no se verifican minuciosamente y se usan para concatenar la declaraci\u00f3n SQL en la funci\u00f3n `create_all_header_nodes()` de `lib/api_automation.php`, lo que finalmente da como resultado SQL inyecci\u00f3n. Al utilizar la tecnolog\u00eda de inyecci\u00f3n secundaria basada en SQL, los atacantes pueden modificar el contenido de la base de datos de Cacti y, en funci\u00f3n del contenido modificado, es posible lograr un mayor impacto, como la lectura de archivos arbitrarios e incluso la ejecuci\u00f3n remota de c\u00f3digo mediante la escritura de archivos arbitrarios. La versi\u00f3n 1.2.27 contiene un parche para el problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/",
"source": "security-advisories@github.com"
}
]
}