Search

published date: July 6, 2005

CVE-2005-2148 : Input Validation Vulnerability

Description

Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.

Product(s):

  • The Cacti Group Cacti 0.8.1
  • The Cacti Group Cacti 0.8.2
  • The Cacti Group Cacti 0.8.2a
  • The Cacti Group Cacti 0.8.3
  • The Cacti Group Cacti 0.8.3a
  • The Cacti Group Cacti 0.8.4

Question to Ask Vendors:

  1. Can you confirm whether your systems are affected by CVE-2005-2148, and if so, what steps are you currently taking to mitigate this vulnerability?
  2. What is your estimated timeline for fully resolving CVE-2005-2148 in your products or services, and how will you communicate updates on this issue to us as your customer?

READY TO GET RESULTS YOU CAN TRUST?