9
CVSSv2

CVE-2009-4112

Published: 30/11/2009 Updated: 10/10/2018
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
VMScore: 905
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Cacti 0.8.7e and previous versions allows remote authenticated administrators to gain privileges by modifying the "Data Input Method" for the "Linux - Get Memory Usage" setting to contain arbitrary commands.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cacti cacti 0.8.6f

cacti cacti 0.8.6c

cacti cacti 0.8.2

cacti cacti 0.8.1

cacti cacti 0.8.5a

cacti cacti 0.8.5

cacti cacti 0.8

cacti cacti 0.6.7

cacti cacti 0.8.4

cacti cacti 0.8.3a

cacti cacti 0.8.7a

cacti cacti

cacti cacti 0.8.7

cacti cacti 0.8.6i

cacti cacti 0.8.3

cacti cacti 0.8.2a

Vendor Advisories

Several vulnerabilities have been found in cacti, a frontend to rrdtool for monitoring systems and services The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-3112, CVE-2007-3113 It was discovered that cacti is prone to a denial of service via the graph_height, graph_width, graph_start and graph_end param ...
Debian Bug report logs - #742768 cacti: CVE-2014-2326 CVE-2014-2327 CVE-2014-2328 Package: cacti; Maintainer for cacti is Cacti Maintainer <pkg-cacti-maint@listsaliothdebianorg>; Source for cacti is src:cacti (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 27 Mar 2014 07:03:01 UTC ...
Debian Bug report logs - #561339 CVE-2009-4112: arbitrary command execution Package: cacti; Maintainer for cacti is Cacti Maintainer <pkg-cacti-maint@listsaliothdebianorg>; Source for cacti is src:cacti (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Wed, 16 Dec 2009 11:42:02 ...
Debian Bug report logs - #881110 cacti: CVE-2017-16641: arbitrary execution of os commands via path_rrdtool parameter in an action=save request Package: src:cacti; Maintainer for src:cacti is Cacti Maintainer <pkg-cacti-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 7 ...

Exploits

source: wwwsecurityfocuscom/bid/37145/info The Joomla! ProofReader component is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected si ...