Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-2148

Опубликовано: 06 июл. 2005
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.

РелизСтатусПримечание
dapper

released

0.8.6h-1ubuntu3.1
devel

released

0.8.6i-3
edgy

released

0.8.6h-3ubuntu0.1
feisty

released

0.8.6i-3
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 88%
0.04133
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
около 20 лет назад

Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.

debian
около 20 лет назад

Cacti 0.8.6e and earlier does not perform proper input validation to p ...

github
больше 3 лет назад

Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.

EPSS

Процентиль: 88%
0.04133
Низкий

7.5 High

CVSS2