VID |
210029 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Cacti program is vulnerable to an SQL injection vulnerability via the 'copy_cacti_user.php' script. Cacti is a Web-based frontend to RRDTool (Round Robin Database tool) for network graphing written by PHP. Cacti versions 0.8.6i and earlier could allow a remote attacker to execute arbitrary SQL commands using a vulnerability in the 'copy_cacti_user.php' script. If register_argc_argv is enabled, a remote attacker could exploit this vulnerability to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://milw0rm.com/exploits/3045
* Platforms Affected: The Cacti Group, Cacti versions 0.8.6i and earlier Any operating system Any version |
Recommendation |
No upgrade or patch available as of January 2007.
Upgrade to a version of Cacti greater than 0.8.6i, when new fixed version becomes available from the Cacti Download Web page at http://www.cacti.net/download_cacti.php |
Related URL |
(CVE) |
Related URL |
21823 (SecurityFocus) |
Related URL |
31234 (ISS) |
|