SQL injection vulnerability in auth_login.php in Cacti 0.8.5a allows remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cacti | The_cacti_group | 0.6 | 0.6 |
Cacti | The_cacti_group | 0.6.1 | 0.6.1 |
Cacti | The_cacti_group | 0.6.2 | 0.6.2 |
Cacti | The_cacti_group | 0.6.3 | 0.6.3 |
Cacti | The_cacti_group | 0.6.4 | 0.6.4 |
Cacti | The_cacti_group | 0.6.5 | 0.6.5 |
Cacti | The_cacti_group | 0.6.6 | 0.6.6 |
Cacti | The_cacti_group | 0.6.7 | 0.6.7 |
Cacti | The_cacti_group | 0.6.8 | 0.6.8 |
Cacti | The_cacti_group | 0.6.8a | 0.6.8a |
Cacti | The_cacti_group | 0.8 | 0.8 |
Cacti | The_cacti_group | 0.8.1 | 0.8.1 |
Cacti | The_cacti_group | 0.8.2 | 0.8.2 |
Cacti | The_cacti_group | 0.8.2a | 0.8.2a |
Cacti | The_cacti_group | 0.8.3 | 0.8.3 |
Cacti | The_cacti_group | 0.8.3a | 0.8.3a |
Cacti | The_cacti_group | 0.8.4 | 0.8.4 |
Cacti | The_cacti_group | 0.8.5 | 0.8.5 |
Cacti | The_cacti_group | 0.8.5a | 0.8.5a |