9
CVSSv2

CVE-2017-16660

Published: 08/11/2017 Updated: 03/10/2019
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header.

Vulnerable Product Search on Vulmon Subscribe to Product

cacti cacti 1.1.27

Vendor Advisories

Debian Bug report logs - #881110 cacti: CVE-2017-16641: arbitrary execution of os commands via path_rrdtool parameter in an action=save request Package: src:cacti; Maintainer for src:cacti is Cacti Maintainer <pkg-cacti-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 7 ...
Cacti 1127 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agentphp request containing PHP code in a Client-ip header ...