CVSS 3.1 Score 10.0 of 10 (high)


Published May 14, 2024


CVE-2024-29895 is a command injection vulnerability found in Cacti, an operational monitoring and fault management framework. This vulnerability affects the 1.3.x DEV branch of Cacti. It allows any unauthenticated user to execute arbitrary commands on the server when the `register_argc_argv` option of PHP is turned on. The issue arises in `cmd_realtime.php` line 119, where the `$poller_id` used for command execution is sourced from `$_SERVER['argv']`, which can be controlled through a URL when the `register_argc_argv` option is enabled. The potential danger of this vulnerability is high, as it can lead to unauthorized access and control over the server. A patch for this issue was initially included in commit 53e8014d1f082034e0646edc6286cde3800c683d but was later reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc. It is recommended to apply the patch provided in the initial commit to remediate this vulnerability.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-29895 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options