7.5
CVSSv2

CVE-2006-6799

Published: 28/12/2006 Updated: 17/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in Cacti 0.8.6i and previous versions, when register_argc_argv is enabled, allows remote malicious users to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php. NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.

Vulnerable Product Search on Vulmon Subscribe to Product

the cacti group cacti

Vendor Advisories

Debian Bug report logs - #404818 SA23528: cacti: "cmdphp" Command Execution and SQL Injection Package: cacti; Maintainer for cacti is Cacti Maintainer <pkg-cacti-maint@listsaliothdebianorg>; Source for cacti is src:cacti (PTS, buildd, popcon) Reported by: Alex de Oliveira Silva <enerv@hostsk> Date: Thu, 28 Dec 2 ...
It was discovered that cacti, a frontend to rrdtool, performs insufficient validation of data passed to the cmd script, which allows SQL injection and the execution of arbitrary shell commands For the stable distribution (sarge) this problem has been fixed in version 086c-7sarge4 For the upcoming stable distribution (etch) this problem has been ...