CVE-2021-40643

EyesOfNetwork before 07-07-2021 has a Remote Code Execution vulnerability on the mail options configuration page. In the location of the "sendmail" application in the "cacti" configuration page (by default/usr/sbin/sendmail) it is possible to execute any command, which will be executed when we make a test of the configuration ("send test mail").
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:eyesofnetwork:eyesofnetwork:*:*:*:*:*:*:*:*

History

11 Jul 2022, 18:35

Type Values Removed Values Added
First Time Eyesofnetwork
Eyesofnetwork eyesofnetwork
CPE cpe:2.3:a:eyesofnetwork:eyesofnetwork:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 9.8
References (MISC) https://eyesofnetwork.com - (MISC) https://eyesofnetwork.com - Broken Link
References (MISC) https://www.eyesofnetwork.com/en/news/vulnerabilite-cacti - (MISC) https://www.eyesofnetwork.com/en/news/vulnerabilite-cacti - Patch, Vendor Advisory
CWE NVD-CWE-noinfo

30 Jun 2022, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-30 11:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-40643

Mitre link : CVE-2021-40643

CVE.ORG link : CVE-2021-40643


JSON object : View

Products Affected

eyesofnetwork

  • eyesofnetwork