Description
Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.
Product(s):
- The Cacti Group Cacti 0.8.1
- The Cacti Group Cacti 0.8.2
- The Cacti Group Cacti 0.8.2a
- The Cacti Group Cacti 0.8.3
- The Cacti Group Cacti 0.8.3a
- The Cacti Group Cacti 0.8.4
- The Cacti Group Cacti 0.8.5
- The Cacti Group Cacti 0.8.5a
- The Cacti Group Cacti 0.8.6
- The Cacti Group Cacti 0.8.6a
- The Cacti Group Cacti 0.8.6b
- The Cacti Group Cacti 0.8.6c
- The Cacti Group Cacti 0.8.6d
- The Cacti Group Cacti 0.8.6e
- The Cacti Group Cacti 0.8
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-2148, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-2148 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.