SQL injection vulnerability in auth_login.php in Cacti 0.8.5a allows remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cacti | The_cacti_group | 0.6 (including) | 0.6 (including) |
Cacti | The_cacti_group | 0.6.1 (including) | 0.6.1 (including) |
Cacti | The_cacti_group | 0.6.2 (including) | 0.6.2 (including) |
Cacti | The_cacti_group | 0.6.3 (including) | 0.6.3 (including) |
Cacti | The_cacti_group | 0.6.4 (including) | 0.6.4 (including) |
Cacti | The_cacti_group | 0.6.5 (including) | 0.6.5 (including) |
Cacti | The_cacti_group | 0.6.6 (including) | 0.6.6 (including) |
Cacti | The_cacti_group | 0.6.7 (including) | 0.6.7 (including) |
Cacti | The_cacti_group | 0.6.8 (including) | 0.6.8 (including) |
Cacti | The_cacti_group | 0.6.8a (including) | 0.6.8a (including) |
Cacti | The_cacti_group | 0.8 (including) | 0.8 (including) |
Cacti | The_cacti_group | 0.8.1 (including) | 0.8.1 (including) |
Cacti | The_cacti_group | 0.8.2 (including) | 0.8.2 (including) |
Cacti | The_cacti_group | 0.8.2a (including) | 0.8.2a (including) |
Cacti | The_cacti_group | 0.8.3 (including) | 0.8.3 (including) |
Cacti | The_cacti_group | 0.8.3a (including) | 0.8.3a (including) |
Cacti | The_cacti_group | 0.8.4 (including) | 0.8.4 (including) |
Cacti | The_cacti_group | 0.8.5 (including) | 0.8.5 (including) |
Cacti | The_cacti_group | 0.8.5a (including) | 0.8.5a (including) |