Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `form_save()` function in `graph_template_inputs.php` is not thoroughly checked and is used to concatenate the SQL statement in `draw_nontemplated_fields_graph_item()` function from `lib/html_form_templates.php` , finally resulting in SQL injection. Version 1.2.27 contains a patch for the issue.
                
            References
                    Configurations
                    History
                    18 Dec 2024, 20:47
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x - Exploit, Vendor Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - Product | |
| CPE | cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* | |
| First Time | Cacti Fedoraproject fedora Cacti cacti Fedoraproject | 
21 Nov 2024, 09:13
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/ - | 
10 Jun 2024, 17:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | |
| Summary | 
 | 
14 May 2024, 15:25
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-05-14 15:25
Updated : 2024-12-18 20:47
NVD link : CVE-2024-31458
Mitre link : CVE-2024-31458
CVE.ORG link : CVE-2024-31458
JSON object : View
Products Affected
                cacti
- cacti
fedoraproject
- fedora
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
