CVE Vulnerabilities

CVE-2005-2148

Published: Jul 06, 2005 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.

Affected Software

NameVendorStart VersionEnd Version
CactiThe_cacti_group0.8 (including)0.8 (including)
CactiThe_cacti_group0.8.1 (including)0.8.1 (including)
CactiThe_cacti_group0.8.2 (including)0.8.2 (including)
CactiThe_cacti_group0.8.2a (including)0.8.2a (including)
CactiThe_cacti_group0.8.3 (including)0.8.3 (including)
CactiThe_cacti_group0.8.3a (including)0.8.3a (including)
CactiThe_cacti_group0.8.4 (including)0.8.4 (including)
CactiThe_cacti_group0.8.5 (including)0.8.5 (including)
CactiThe_cacti_group0.8.5a (including)0.8.5a (including)
CactiThe_cacti_group0.8.6 (including)0.8.6 (including)
CactiThe_cacti_group0.8.6a (including)0.8.6a (including)
CactiThe_cacti_group0.8.6b (including)0.8.6b (including)
CactiThe_cacti_group0.8.6c (including)0.8.6c (including)
CactiThe_cacti_group0.8.6d (including)0.8.6d (including)
CactiThe_cacti_group0.8.6e (including)0.8.6e (including)
CactiUbuntudapper*
CactiUbuntudevel*
CactiUbuntuedgy*
CactiUbuntufeisty*

References