Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2005-2148

Опубликовано: 06 июл. 2005
Источник: nvd
CVSS2: 7.5
EPSS Низкий

Описание

Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:the_cacti_group:cacti:0.8:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.2a:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.3a:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.5a:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.6a:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.6b:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.6c:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.6d:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.6e:*:*:*:*:*:*:*

EPSS

Процентиль: 88%
0.04133
Низкий

7.5 High

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

ubuntu
около 20 лет назад

Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.

debian
около 20 лет назад

Cacti 0.8.6e and earlier does not perform proper input validation to p ...

github
больше 3 лет назад

Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.

EPSS

Процентиль: 88%
0.04133
Низкий

7.5 High

CVSS2

Дефекты

NVD-CWE-Other