5.5
CVSSv2

CVE-2019-17358

Published: 12/12/2019 Updated: 24/08/2020
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P

Vulnerability Summary

Cacti up to and including 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP module.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cacti cacti

debian debian linux 8.0

opensuse leap 42.3

Vendor Advisories

Debian Bug report logs - #947375 cacti: CVE-2019-17358 Package: src:cacti; Maintainer for src:cacti is Cacti Maintainer <pkg-cacti-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 25 Dec 2019 21:30:02 UTC Severity: important Tags: security, upstream Found in version ca ...
Multiple issues have been found in cacti, a server monitoring system, potentially resulting in SQL code execution or information disclosure by authenticated users CVE-2019-16723 Authenticated users may bypass authorization checks for viewing a graph by submitting requests with modified local_graph_id parameters CVE-2019-17357 The gra ...