CVE-2024-29895

Cacti command injection in cmd_realtime.php

Basic Information

CVE State
PUBLISHED
Reserved Date
March 21, 2024
Published Date
May 13, 2024
Last Updated
August 02, 2024
Vendor
Cacti
Product
cacti
Description
Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc.
Tags
php nuclei_scanner

CVSS Scores

CVSS v3.1

10.0 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS Score

Score
92.65% (Percentile: 99.74%) as of 2025-07-17

SSVC Information

Exploitation
poc
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2025-06-26 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-06-27 12:00:52 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

Rubioo02/CVE-2024-29895

Type: github • Created: 2024-05-17 22:03:29 UTC • Stars: 4

CVE-2024-29895 | RCE on CACTI 1.3.X dev

secunnix/CVE-2024-29895

Type: github • Created: 2024-05-16 06:29:21 UTC • Stars: 1

Cacti CVE-2024-29895 POC

Stuub/CVE-2024-29895-CactiRCE-PoC

Type: github • Created: 2024-05-15 13:11:45 UTC • Stars: 21

CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel