Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-4000

Опубликовано: 15 нояб. 2017
Источник: debian

Описание

Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cactifixed0.8.8e+ds1-1package
cactifixed0.8.8b+dfsg-8+deb8u2jessiepackage
cactifixed0.8.8a+dfsg-5+deb7u6wheezypackage

Примечания

  • http://www.cacti.net/release_notes_1_0_0.php

  • http://bugs.cacti.net/view.php?id=2452 (not accessible: marked as security issue)

  • http://svn.cacti.net/viewvc?view=rev&revision=7731

  • This CVE was fixed by introduction of the function sanitize_unserialize_selected_items

  • in version 0.8.8e and calling it instead of unserialize(stripslashes()).

  • Affected files require authenticated users.

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 8 лет назад

Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).

CVSS3: 8.8
nvd
около 8 лет назад

Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).

suse-cvrf
почти 9 лет назад

Security update for cacti

CVSS3: 8.8
github
больше 3 лет назад

Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).