Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-2092

Опубликовано: 20 мая 2010
Источник: redhat
CVSS2: 6.5
EPSS Низкий

Описание

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=609076cacti: graph.php rra_id SQL injection vulnerability (MOPS-2010-023)

EPSS

Процентиль: 34%
0.00139
Низкий

6.5 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.

nvd
больше 15 лет назад

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.

debian
больше 15 лет назад

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier a ...

github
больше 3 лет назад

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.

EPSS

Процентиль: 34%
0.00139
Низкий

6.5 Medium

CVSS2