Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.
2005-07-06T04:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | the_cacti_group | cacti | 0.8 | Yes |
Application | the_cacti_group | cacti | 0.8.1 | Yes |
Application | the_cacti_group | cacti | 0.8.2 | Yes |
Application | the_cacti_group | cacti | 0.8.2a | Yes |
Application | the_cacti_group | cacti | 0.8.3 | Yes |
Application | the_cacti_group | cacti | 0.8.3a | Yes |
Application | the_cacti_group | cacti | 0.8.4 | Yes |
Application | the_cacti_group | cacti | 0.8.5 | Yes |
Application | the_cacti_group | cacti | 0.8.5a | Yes |
Application | the_cacti_group | cacti | 0.8.6 | Yes |
Application | the_cacti_group | cacti | 0.8.6a | Yes |
Application | the_cacti_group | cacti | 0.8.6b | Yes |
Application | the_cacti_group | cacti | 0.8.6c | Yes |
Application | the_cacti_group | cacti | 0.8.6d | Yes |
Application | the_cacti_group | cacti | 0.8.6e | Yes |