{"id":"CVE-2017-16660","details":"Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header.","modified":"2026-03-14T09:22:35.991538Z","published":"2017-11-08T05:29:00.247Z","related":["openSUSE-SU-2024:10670-1"],"references":[{"type":"FIX","url":"https://github.com/Cacti/cacti/issues/1066"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cacti/cacti","events":[{"introduced":"0"},{"last_affected":"f69831551a9ec9c83ede7112053594001f428eb9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.1.27"}]}}],"versions":["release/1.0.0","release/1.0.1","release/1.0.2","release/1.0.3","release/1.0.4","release/1.0.5","release/1.0.6","release/1.1.0","release/1.1.1","release/1.1.11","release/1.1.12","release/1.1.13","release/1.1.14","release/1.1.15","release/1.1.16","release/1.1.17","release/1.1.18","release/1.1.19","release/1.1.2","release/1.1.20","release/1.1.21","release/1.1.22","release/1.1.23","release/1.1.24","release/1.1.25","release/1.1.26","release/1.1.27","release/1.1.3","release/1.1.4","release/1.1.5","release/1.1.6","release/1.1.7","release/1.1.8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-16660.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}