Vulnerability Name:

CVE-2005-2148 (CCN-21266)

Assigned:2005-07-02
Published:2005-07-02
Updated:2017-07-11
Summary:Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Data Manipulation
References:Source: CCN
Type: BugTraq Mailing List, Sat Jul 02 2005 - 02:08:58 CDT
Cacti Multiple SQL Injection Vulnerabilities [FIXED]

Source: MITRE
Type: CNA
CVE-2005-2148

Source: CCN
Type: SA15490
Cacti Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
15490

Source: CCN
Type: SECTRACK ID: 1014361
Cacti Input Validation Holes Let Remote Users Inject SQL Commands, Bypass Authentication, and Execute Arbitrary Commands

Source: SECTRACK
Type: UNKNOWN
1014361

Source: MLIST
Type: Patch
[cacti-announce] 20050701 Cacti 0.8.6f Released

Source: CONFIRM
Type: Patch
http://www.cacti.net/downloads/patches/0.8.6e/cacti-0.8.6f_security.patch

Source: CCN
Type: Cacti Download Web page
Download Cacti

Source: DEBIAN
Type: UNKNOWN
DSA-764

Source: DEBIAN
Type: DSA-764
cacti -- several vulnerabilities

Source: CCN
Type: Hardened-PHP project Security Advisory 2005/07/01
Cacti Multiple SQL Injection Vulnerabilities

Source: MISC
Type: Patch, Vendor Advisory
http://www.hardened-php.net/advisory-032005.php

Source: MISC
Type: Patch
http://www.hardened-php.net/advisory-042005.php

Source: CCN
Type: OSVDB ID: 17720
Cacti rrdtool Sanity Check Bypass Arbitrary Command Execution

Source: CCN
Type: OSVDB ID: 17721
Cacti SQL Injection Filter Bypass

Source: BUGTRAQ
Type: UNKNOWN
20050702 Advisory 04/2005: Cacti Remote Command Execution Vulnerability

Source: BUGTRAQ
Type: UNKNOWN
20050702 Advisory 03/2005: Cacti Multiple SQL Injection Vulnerabilities [FIXED]

Source: BID
Type: UNKNOWN
14128

Source: CCN
Type: BID-14128
RaXnet Cacti Input Filter Multiple SQL Injection Vulnerabilities

Source: BID
Type: UNKNOWN
14129

Source: CCN
Type: BID-14129
RaXnet Cacti Graph_Image.PHP Remote Command Execution Variant Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2005-0951

Source: XF
Type: UNKNOWN
cacti-graph-post-cookie-sql-injection(21266)

Source: XF
Type: UNKNOWN
cacti-graph-post-cookie-sql-injection(21266)

Source: XF
Type: UNKNOWN
cacti-request-array-command-execution(21270)

Source: SUSE
Type: SUSE-SR:2005:017
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:the_cacti_group:cacti:0.8:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.2a:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.3a:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.5:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.5a:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.6:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.6a:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.6b:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.6c:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.6d:*:*:*:*:*:*:*
  • OR cpe:/a:the_cacti_group:cacti:0.8.6e:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:cacti:cacti:0.8.6e:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:764
    V
    several vulnerabilities
    2005-07-21
    BACK
    the_cacti_group cacti 0.8
    the_cacti_group cacti 0.8.1
    the_cacti_group cacti 0.8.2
    the_cacti_group cacti 0.8.2a
    the_cacti_group cacti 0.8.3
    the_cacti_group cacti 0.8.3a
    the_cacti_group cacti 0.8.4
    the_cacti_group cacti 0.8.5
    the_cacti_group cacti 0.8.5a
    the_cacti_group cacti 0.8.6
    the_cacti_group cacti 0.8.6a
    the_cacti_group cacti 0.8.6b
    the_cacti_group cacti 0.8.6c
    the_cacti_group cacti 0.8.6d
    the_cacti_group cacti 0.8.6e
    cacti cacti 0.8.6e
    debian debian linux 3.0
    debian debian linux 3.1