Bug 1215039 (CVE-2023-31132)

Summary: VUL-0: CVE-2023-31132: cacti: Privilege escalation when Cacti installed using Windows Installer defaults
Product: [Novell Products] SUSE Security Incidents Reporter: Cathy Hu <cathy.hu>
Component: IncidentsAssignee: Andreas Stieger <Andreas.Stieger>
Status: RESOLVED INVALID QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P5 - None CC: security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/377370/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on:    
Bug Blocks: 1215024    

Description Cathy Hu 2023-09-06 08:12:34 UTC
CVE-2023-31132

Cacti is an open source operational monitoring and fault management framework.
Affected versions are subject to a privilege escalation vulnerability. A
low-privileged OS user with access to a Windows host where Cacti is installed
can create arbitrary PHP files in a web document directory. The user can then
execute the PHP files under the security context of SYSTEM. This allows an
attacker to escalate privilege from a normal user account to SYSTEM. This issue
has been addressed in version 1.2.25. Users are advised to upgrade. There are no
known workarounds for this vulnerability.


References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31132
https://bugzilla.redhat.com/show_bug.cgi?id=2237619
https://www.cve.org/CVERecord?id=CVE-2023-31132
https://github.com/Cacti/cacti/security/advisories/GHSA-rf5w-pq3f-9876
Comment 1 Cathy Hu 2023-09-06 08:14:17 UTC
windows installer only, closing