It was discovered that Cacti did not properly sanitize the 'pollerid' parameter in the "remoteagent.php" file. A remote attacker could possibly use this issue to achieve remote code execution.
{ "binaries": [ { "binary_name": "cacti", "binary_version": "1.1.38+ds1-1ubuntu0.1~esm4" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "ecosystem": "Ubuntu:Pro:18.04:LTS", "cves": [ { "id": "CVE-2022-46169", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "high" } ] } ] }
{ "binaries": [ { "binary_name": "cacti", "binary_version": "1.2.10+ds1-1ubuntu1.1+esm2" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "ecosystem": "Ubuntu:Pro:20.04:LTS", "cves": [ { "id": "CVE-2022-46169", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "high" } ] } ] }
{ "binaries": [ { "binary_name": "cacti", "binary_version": "1.2.19+ds1-2ubuntu1.1+esm2" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "ecosystem": "Ubuntu:Pro:22.04:LTS", "cves": [ { "id": "CVE-2022-46169", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "high" } ] } ] }