CVE-2024-54146
Published: 27 January 2025
Summary
CVE-2024-54146 is a high-severity SQL Injection (CWE-89) vulnerability in Cacti Cacti. Its CVSS base score is 7.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 7.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2024-54146 by requiring timely patching of the SQL injection flaw in Cacti to version 1.2.29.
Prevents exploitation of the SQL injection vulnerability by enforcing validation and sanitization of the unsanitized graph_template parameter in host_templates.php.
Identifies the SQL injection vulnerability through vulnerability scanning, enabling proactive remediation before exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection flaw in web application (host_templates.php) directly enables remote exploitation of a publicly accessible management interface.
NVD Description
Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the template function of host_templates.php using the graph_template parameter. This vulnerability is fixed in 1.2.29.
Deeper analysisAI
CVE-2024-54146 is a SQL injection vulnerability (CWE-89) affecting Cacti, an open-source performance and fault management framework. The flaw exists in the template function of the host_templates.php file, where the graph_template parameter is not properly sanitized, enabling injection attacks. Published on January 27, 2025, the vulnerability carries a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) and was addressed in Cacti version 1.2.29.
An attacker with low-privilege access, such as an authenticated user, can exploit this over the network with low complexity and no user interaction required. Exploitation allows limited impacts on confidentiality and integrity—potentially exposing or altering some data—but a high availability impact, such as denial-of-service through database disruption.
Mitigation is outlined in the Cacti GitHub security advisory (GHSA-vj9g-p7f2-4wqj) and the associated fix commit (c7e4ee798d263a3209ae6e7ba182c7b65284d8f0), which recommend upgrading to Cacti 1.2.29 or later to patch the SQL injection handling in host_templates.php.
Details
- CWE(s)