Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cacti | Cacti | 1.2.19 (including) | 1.2.19 (including) |
Cacti | Ubuntu | bionic | * |
Cacti | Ubuntu | impish | * |
Cacti | Ubuntu | kinetic | * |
Cacti | Ubuntu | lunar | * |
Cacti | Ubuntu | mantic | * |
Cacti | Ubuntu | trusty | * |
Cacti | Ubuntu | xenial | * |