It was discovered that Cacti did not properly sanitize the 'pollerid' parameter in the "remoteagent.php" file. A remote attacker could possibly use this issue to achieve remote code execution.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.1.38+ds1-1ubuntu0.1~esm4", "binary_name": "cacti" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.2.10+ds1-1ubuntu1.1+esm2", "binary_name": "cacti" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.2.19+ds1-2ubuntu1.1+esm2", "binary_name": "cacti" } ] }