[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-22902":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":48},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":45,"name":46,"published":47,"updated":27},22902,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},2,"Nuclei",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":38,"epss_score":39,"epss_percentile":40,"cve":41,"in_cisa_catalog":43,"date":44,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"critical","The risk exists that a remote unauthenticated attacker can fully compromise the server to steal confidential information, install ransomware, or pivot to the internal network.","Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP.","Update Cacti to a version that patches the command injection vulnerability.",[33,34,35,36,37],"https://github.com/Stuub/CVE-2024-29895-CactiRCE-PoC","https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/cmd_realtime.php#L119","https://github.com/Cacti/cacti/commit/53e8014d1f082034e0646edc6286cde3800c683d","https://github.com/Cacti/cacti/commit/99633903cad0de5ace636249de16f77e57a3c8fc","https://github.com/Cacti/cacti/security/advisories/GHSA-cr28-x256-xf5m",10,0.93223,0.99799,[42],"CVE-2024-29895",false,"2024-05-14T00:00:00Z","NETSCAN-NUCLEI-CVE-CVE-2024-29895","Cacti cmd_realtime.php - Command Injection","2024-06-21T00:00:00Z",["Island",49],{"key":50,"params":51,"result":53},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":52},"{\"text-color\":\"gray\"}",{"head":54},{}]