Vulnerability Name: | CVE-2014-4000 (CCN-135017) | ||||||||||||||||||||||||||||||||
Assigned: | 2014-06-09 | ||||||||||||||||||||||||||||||||
Published: | 2017-01-30 | ||||||||||||||||||||||||||||||||
Updated: | 2017-11-29 | ||||||||||||||||||||||||||||||||
Summary: | Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()). | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-94 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-4000 Source: XF Type: UNKNOWN cacti-cve20144000-code-exec(135017) Source: CONFIRM Type: Issue Tracking, Release Notes, Vendor Advisory https://forums.cacti.net/viewtopic.php?f=4&t=56794 Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2014-4000 Source: GENTOO Type: Issue Tracking, Third Party Advisory GLSA-201711-10 Source: CCN Type: Cacti Web site Release Notes - 1.0.0 Source: CONFIRM Type: Issue Tracking, Release Notes, Vendor Advisory https://www.cacti.net/release_notes_1_0_0.php | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |