4
CVSSv2

CVE-2017-16661

Published: 08/11/2017 Updated: 28/11/2017
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 4.9 | Impact Score: 3.6 | Exploitability Score: 1.2
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

Cacti 1.1.27 allows remote authenticated administrators to read arbitrary files by placing the Log Path into a private directory, and then making a clog.php?filename= request, as demonstrated by filename=passwd (with a Log Path under /etc) to read /etc/passwd.

Vulnerable Product Search on Vulmon Subscribe to Product

cacti cacti 1.1.27

Vendor Advisories

Debian Bug report logs - #881110 cacti: CVE-2017-16641: arbitrary execution of os commands via path_rrdtool parameter in an action=save request Package: src:cacti; Maintainer for src:cacti is Cacti Maintainer <pkg-cacti-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 7 ...
Cacti 1127 allows remote authenticated administrators to read arbitrary files by placing the Log Path into a private directory, and then making a clogphp?filename= request, as demonstrated by filename=passwd (with a Log Path under /etc) to read /etc/passwd ...