Описание
Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.
Ссылки
- Issue TrackingThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Issue TrackingThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:cacti:cacti:1.2.19:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Конфигурация 3
Одно из
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
EPSS
Процентиль: 55%
0.00324
Низкий
9.8 Critical
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-287
CWE-287
Связанные уязвимости
CVSS3: 9.8
ubuntu
почти 4 года назад
Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.
CVSS3: 9.8
debian
почти 4 года назад
Under certain ldap conditions, Cacti authentication can be bypassed wi ...
CVSS3: 9.8
github
почти 4 года назад
Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.
EPSS
Процентиль: 55%
0.00324
Низкий
9.8 Critical
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-287
CWE-287