Description
PHP file inclusion vulnerability in top_graph_header.php in Cacti 0.8.6d and possibly earlier versions allows remote attackers to execute arbitrary PHP code via the config[library_path] parameter.
Product(s):
- The Cacti Group Cacti
- The Cacti Group Cacti 0.5
- The Cacti Group Cacti 0.6.1
- The Cacti Group Cacti 0.6.2
- The Cacti Group Cacti 0.6.3
- The Cacti Group Cacti 0.6.4
- The Cacti Group Cacti 0.6.5
- The Cacti Group Cacti 0.6.6
- The Cacti Group Cacti 0.6.7
- The Cacti Group Cacti 0.6.8
- The Cacti Group Cacti 0.6.8a
- The Cacti Group Cacti 0.6
- The Cacti Group Cacti 0.8.1
- The Cacti Group Cacti 0.8.2
- The Cacti Group Cacti 0.8.2a
- The Cacti Group Cacti 0.8.3
- The Cacti Group Cacti 0.8.3a
- The Cacti Group Cacti 0.8.4
- The Cacti Group Cacti 0.8.5a
- The Cacti Group Cacti 0.8
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-1524, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-1524 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.