CVE-2023-39365

Name
CVE-2023-39365
Description
Cacti is an open source operational monitoring and fault management framework. Issues with Cacti Regular Expression validation combined with the external links feature can lead to limited SQL Injections and subsequent data leakage. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
CONFIRM https://github.com/Cacti/cacti/security/advisories/GHSA-v5w7-hww7-2f22
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
https://www.debian.org/security/2023/dsa-5550
security-advisories@github.com https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html

Match rules

CPE URI Source package Min version Max version
cacti >= 0 < 1.2.25

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
cacti 3.18-community 1.2.24-r1 Jeff Bilyk <jbilyk@gmail.com> possibly vulnerable