Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-35701

Опубликовано: 11 янв. 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Cacti 1.2.x through 1.2.16. A SQL injection vulnerability in data_debug.php allows remote authenticated attackers to execute arbitrary SQL commands via the site_id parameter. This can lead to remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cactifixed1.2.16+ds1-2package
cactifixed1.2.2+ds1-2+deb10u4busterpackage
cactinot-affectedstretchpackage

Примечания

  • https://github.com/Cacti/cacti/issues/4022

  • https://asaf.me/2020/12/15/cacti-1-2-0-to-1-2-16-sql-injection/

  • Introduced in: https://github.com/Cacti/cacti/commit/6e1b8431b77efe55ba5115e35fe045e101dd619b (1.2.0)

  • Fixed by: https://github.com/Cacti/cacti/commit/565e0604a53f4988dc5b544d01f4a631eaa80d82

EPSS

Процентиль: 83%
0.01839
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 5 лет назад

An issue was discovered in Cacti 1.2.x through 1.2.16. A SQL injection vulnerability in data_debug.php allows remote authenticated attackers to execute arbitrary SQL commands via the site_id parameter. This can lead to remote code execution.

CVSS3: 8.8
nvd
около 5 лет назад

An issue was discovered in Cacti 1.2.x through 1.2.16. A SQL injection vulnerability in data_debug.php allows remote authenticated attackers to execute arbitrary SQL commands via the site_id parameter. This can lead to remote code execution.

suse-cvrf
больше 4 лет назад

Security update for cacti, cacti-spine

github
больше 3 лет назад

An issue was discovered in Cacti 1.2.x through 1.2.16. A SQL injection vulnerability in data_debug.php allows remote authenticated attackers to execute arbitrary SQL commands via the site_id parameter. This can lead to remote code execution.

EPSS

Процентиль: 83%
0.01839
Низкий