Vulnerability Name: | CVE-2005-2148 (CCN-21266) | ||||||||
Assigned: | 2005-07-02 | ||||||||
Published: | 2005-07-02 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Data Manipulation | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Sat Jul 02 2005 - 02:08:58 CDT Cacti Multiple SQL Injection Vulnerabilities [FIXED] Source: MITRE Type: CNA CVE-2005-2148 Source: CCN Type: SA15490 Cacti Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 15490 Source: CCN Type: SECTRACK ID: 1014361 Cacti Input Validation Holes Let Remote Users Inject SQL Commands, Bypass Authentication, and Execute Arbitrary Commands Source: SECTRACK Type: UNKNOWN 1014361 Source: MLIST Type: Patch [cacti-announce] 20050701 Cacti 0.8.6f Released Source: CONFIRM Type: Patch http://www.cacti.net/downloads/patches/0.8.6e/cacti-0.8.6f_security.patch Source: CCN Type: Cacti Download Web page Download Cacti Source: DEBIAN Type: UNKNOWN DSA-764 Source: DEBIAN Type: DSA-764 cacti -- several vulnerabilities Source: CCN Type: Hardened-PHP project Security Advisory 2005/07/01 Cacti Multiple SQL Injection Vulnerabilities Source: MISC Type: Patch, Vendor Advisory http://www.hardened-php.net/advisory-032005.php Source: MISC Type: Patch http://www.hardened-php.net/advisory-042005.php Source: CCN Type: OSVDB ID: 17720 Cacti rrdtool Sanity Check Bypass Arbitrary Command Execution Source: CCN Type: OSVDB ID: 17721 Cacti SQL Injection Filter Bypass Source: BUGTRAQ Type: UNKNOWN 20050702 Advisory 04/2005: Cacti Remote Command Execution Vulnerability Source: BUGTRAQ Type: UNKNOWN 20050702 Advisory 03/2005: Cacti Multiple SQL Injection Vulnerabilities [FIXED] Source: BID Type: UNKNOWN 14128 Source: CCN Type: BID-14128 RaXnet Cacti Input Filter Multiple SQL Injection Vulnerabilities Source: BID Type: UNKNOWN 14129 Source: CCN Type: BID-14129 RaXnet Cacti Graph_Image.PHP Remote Command Execution Variant Vulnerability Source: VUPEN Type: UNKNOWN ADV-2005-0951 Source: XF Type: UNKNOWN cacti-graph-post-cookie-sql-injection(21266) Source: XF Type: UNKNOWN cacti-graph-post-cookie-sql-injection(21266) Source: XF Type: UNKNOWN cacti-request-array-command-execution(21270) Source: SUSE Type: SUSE-SR:2005:017 SUSE Security Summary Report | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |