CVE-2005-2148
Published Jul 6, 2005
Last updated 7 years ago
Overview
- Description
- Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.
- Source
- security@debian.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3BBF3F3-18C0-49C5-99B0-80FCD133532B" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1896A7C-6938-494D-90A5-E10BC91EB37D" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19CD9A10-32F6-45A4-8793-87E0C2E78675" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6EF1390-E1B5-45B0-8732-A7004351E1BF" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D3D7996-E56A-4B72-864E-EC6037028351" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "000AE712-7298-4CA1-930B-4DF372671EDD" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFD258DF-CB70-484C-9A6F-F9ABDB012C8C" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFF12ADC-83AA-45FE-9678-F49D05234D39" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.5a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43FD0F4A-4811-4B4A-AF03-8FBC63A99CE9" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "166938A7-2DE3-456D-BE47-6041895E2204" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.6a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7C5ABA2-9BCB-420A-A9E3-8B590F3DD4C0" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.6b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB59E467-8AA1-4D95-B81A-2EFF6F19C34A" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.6c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81F29217-19A4-453D-8290-D35049E45160" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.6d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B424B2E4-5F57-411D-8A69-91E8975A7D33" }, { "criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.6e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CAB1F6F-06D2-40C7-9D9C-0ABAADDEAC72" } ], "operator": "OR" } ] } ]