Vulnerability Name:
CVE-2010-1431 (CCN-58053)
Assigned:
2010-04-22
Published:
2010-04-22
Updated:
2012-02-16
Summary:
SQL injection vulnerability in templates_export.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via the export_item_id parameter.
CVSS v3 Severity:
7.3 High
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
Low
Availibility (A):
Low
CVSS v2 Severity:
7.5 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
)
6.7 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:TF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
7.5 High
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
)
6.7 Medium
(CCN Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:TF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
Vulnerability Type:
CWE-89
Vulnerability Consequences:
Data Manipulation
References:
Source: CONFIRM
Type: Patch
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578909
Source: MITRE
Type: CNA
CVE-2010-1431
Source: SUSE
Type: UNKNOWN
SUSE-SR:2010:011
Source: FULLDISC
Type: UNKNOWN
20100421 Bonsai Information Security - SQL Injection in Cacti <= 0.8.7e
Source: CCN
Type: SA39568
Cacti export_item_id SQL Injection Vulnerability
Source: SECUNIA
Type: Vendor Advisory
39568
Source: SECUNIA
Type: Vendor Advisory
39572
Source: CCN
Type: SA41041
Red Hat High Performance Computing (HPC) Solution Multiple Vulnerabilities
Source: SECUNIA
Type: UNKNOWN
41041
Source: CONFIRM
Type: Patch
http://www.cacti.net/downloads/patches/0.8.7e/sql_injection_template_export.patch
Source: CCN
Type: Cacti Web site
Cacti
Source: DEBIAN
Type: UNKNOWN
DSA-2039
Source: DEBIAN
Type: DSA-2039
cacti -- missing input sanitising
Source: MISC
Type: UNKNOWN
http://www.exploit-db.com/sploits/Bonsai-SQL_Injection_in_Cacti.pdf
Source: MANDRIVA
Type: UNKNOWN
MDVSA-2010:092
Source: CCN
Type: OSVDB ID: 63967
Cacti templates_export.php export_item_id Parameter SQL Injection
Source: BID
Type: UNKNOWN
39653
Source: CCN
Type: BID-39653
Cacti 'export_item_id' Parameter SQL Injection Vulnerability
Source: CCN
Type: BID-42575
Cacti Cross Site Scripting and HTML Injection Vulnerabilities
Source: VUPEN
Type: Vendor Advisory
ADV-2010-0986
Source: VUPEN
Type: UNKNOWN
ADV-2010-1107
Source: VUPEN
Type: UNKNOWN
ADV-2010-2132
Source: XF
Type: UNKNOWN
cacti-templates-sql-injection(58053)
Source: REDHAT
Type: UNKNOWN
RHSA-2010:0635
Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [04-22-2010]
Source: SUSE
Type: SUSE-SR:2010:011
SUSE Security Summary Report
Vulnerable Configuration:
Configuration 1
:
cpe:/a:cacti:cacti:0.5:-:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.6:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.6.1:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.6.2:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.6.3:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.6.4:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.6.5:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.6.6:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.6.7:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.6.8:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.1:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.2:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.2a:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.3:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.4:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.5:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.6:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.7:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*
OR
cpe:/a:cacti:cacti:*:*:*:*:*:*:*:*
(Version <= 0.8.7e)
Configuration CCN 1
:
cpe:/a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*
AND
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
OR
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
OR
cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
OR
cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.opensuse.security:def:20101431
V
CVE-2010-1431
2015-11-16
BACK
cacti
cacti 0.5 -
cacti
cacti 0.6
cacti
cacti 0.6.1
cacti
cacti 0.6.2
cacti
cacti 0.6.3
cacti
cacti 0.6.4
cacti
cacti 0.6.5
cacti
cacti 0.6.6
cacti
cacti 0.6.7
cacti
cacti 0.6.8
cacti
cacti 0.6.8a
cacti
cacti 0.8
cacti
cacti 0.8.1
cacti
cacti 0.8.2
cacti
cacti 0.8.2a
cacti
cacti 0.8.3
cacti
cacti 0.8.3a
cacti
cacti 0.8.4
cacti
cacti 0.8.5
cacti
cacti 0.8.5a
cacti
cacti 0.8.6
cacti
cacti 0.8.6a
cacti
cacti 0.8.6b
cacti
cacti 0.8.6c
cacti
cacti 0.8.6d
cacti
cacti 0.8.6f
cacti
cacti 0.8.6g
cacti
cacti 0.8.6h
cacti
cacti 0.8.6i
cacti
cacti 0.8.6j
cacti
cacti 0.8.6k
cacti
cacti 0.8.7
cacti
cacti 0.8.7a
cacti
cacti 0.8.7b
cacti
cacti 0.8.7c
cacti
cacti 0.8.7d
cacti
cacti *
cacti
cacti 0.8.7e
mandrakesoft
mandrake linux corporate server 4.0
mandrakesoft
mandrake linux corporate server 4.0
debian
debian linux 5.0
mandriva
enterprise server 5
mandriva
enterprise server 5