USN-7226-1: Cacti vulnerability
23 January 2025
Cacti could be made to crash or run programs if it received specially crafted network traffic.
Releases
Packages
- cacti - web interface for graphing of monitoring systems
Details
It was discovered that Cacti did not properly sanitize the 'poller_id'
parameter in the "remote_agent.php" file. A remote attacker could
possibly use this issue to achieve remote code execution.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
cacti
-
1.2.19+ds1-2ubuntu1.1+esm2
Available with Ubuntu Pro
Ubuntu 20.04
-
cacti
-
1.2.10+ds1-1ubuntu1.1+esm2
Available with Ubuntu Pro
Ubuntu 18.04
-
cacti
-
1.1.38+ds1-1ubuntu0.1~esm4
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.