Vulnerability Name: | CVE-2002-1477 (CCN-10048) | ||||||||
Assigned: | 2002-09-03 | ||||||||
Published: | 2002-09-03 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | graphs.php in Cacti before 0.6.8 allows remote authenticated Cacti administrators to execute arbitrary commands via shell metacharacters in the title during edit mode. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: BUGTRAQ Type: Exploit, Patch, Vendor Advisory 20020903 Cacti security issues Source: MITRE Type: CNA CVE-2002-1477 Source: DEBIAN Type: Patch, Vendor Advisory DSA-164 Source: DEBIAN Type: DSA-164 cacti -- arbitrary code execution Source: XF Type: Patch, Vendor Advisory cacti-graph-label-commands(10048) Source: CCN Type: Knights of the Routing Table Security Advisory krt_001_20020903_cacti Cacti security issues Source: MISC Type: UNKNOWN http://www.knights-of-the-routing-table.org/advisories/krt_001_20020903_cacti.txt Source: CCN Type: OSVDB ID: 8995 Cacti graphs.php Edit Mode Arbitrary Command Execution Source: CCN Type: raXnet Web site raXnet.net - cacti Source: BID Type: UNKNOWN 5627 Source: CCN Type: BID-5627 Raxnet Cacti Command Execution Vulnerability Source: XF Type: UNKNOWN cacti-graph-label-commands(10048) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |