HTTP: Cacti Group Cacti installer.php setPaths Log Path Arbitrary File Write

This signature detects attempts to exploit a known vulnerability against Cacti. A successful attack can lead to arbitrary code execution.

Extended Description

Cacti is an open source performance and fault management framework. An admin user can create a device with a malicious hostname containing php code and repeat the installation process (completing only step 5 of the installation process is enough, no need to complete the steps before or after it) to use a php file as the cacti log file. After having the malicious hostname end up in the logs (log poisoning), one can simply go to the log file url to execute commands to achieve RCE. This issue has been addressed in version 1.2.28 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected Products

Cacti cacti

Short Name
HTTP:CTS:CACTI-INSTALR-PHP
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Arbitrary CVE-2024-43363 CVE-2024-45598 Cacti File Group Log Path Write installer.php setPaths
Release Date
11/14/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3819
False Positive
Unknown
Vendors

Cacti

Found a potential security threat?