Description
Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-7844 | Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header. |
References
| Link | Providers |
|---|---|
| https://github.com/Cacti/cacti/issues/1066 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T17:03:51.376Z
Reserved: 2017-11-07T00:00:00.000Z
Link: CVE-2017-16660
No data.
Status : Modified
Published: 2017-11-08T05:29:00.247
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-16660
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD