7.5
CVSSv2

CVE-2005-2148

Published: 06/07/2005 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Cacti 0.8.6e and previous versions does not perform proper input validation to protect against common attacks, which allows remote malicious users to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.

Vulnerable Product Search on Vulmon Subscribe to Product

the cacti group cacti 0.8.2a

the cacti group cacti 0.8.3

the cacti group cacti 0.8.1

the cacti group cacti 0.8.2

the cacti group cacti 0.8.6

the cacti group cacti 0.8.6a

the cacti group cacti 0.8.3a

the cacti group cacti 0.8.4

the cacti group cacti 0.8.6e

the cacti group cacti 0.8.6b

the cacti group cacti 0.8.6c

the cacti group cacti 0.8.6d

the cacti group cacti 0.8

the cacti group cacti 0.8.5

the cacti group cacti 0.8.5a

Vendor Advisories

Several vulnerabilities have been discovered in cacti, a round-robin database (RRD) tool that helps create graphs from database information The Common Vulnerabilities and Exposures Project identifies the following problems: CAN-2005-1524 Maciej Piotr Falkiewicz and an anonymous researcher discovered an input validation bug that allows an ...