CVE-2024-29895

CVSS 3.1 Score 10.0 of 10 (high)

Details

Published May 14, 2024
CWE ID 77

Summary

CVE-2024-29895 is a command injection vulnerability found in Cacti, an operational monitoring and fault management framework. This vulnerability affects the 1.3.x DEV branch of Cacti. It allows any unauthenticated user to execute arbitrary commands on the server when the `register_argc_argv` option of PHP is turned on. The issue arises in `cmd_realtime.php` line 119, where the `$poller_id` used for command execution is sourced from `$_SERVER['argv']`, which can be controlled through a URL when the `register_argc_argv` option is enabled. The potential danger of this vulnerability is high, as it can lead to unauthorized access and control over the server. A patch for this issue was initially included in commit 53e8014d1f082034e0646edc6286cde3800c683d but was later reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc. It is recommended to apply the patch provided in the initial commit to remediate this vulnerability.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-29895 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions