Cacti: Multiple vulnerabilities
Multiple vulnerabilities were discovered in Cacti.
cacti
2008-03-10
2009-05-28
209918
remote
0.8.7b
0.8.6j-r8
0.8.7b
Cacti is a web-based network graphing and reporting tool.
The following inputs are not properly sanitized before being processed:
- "view_type" parameter in the file graph.php, "filter" parameter
in the file graph_view.php, "action" and "login_username" parameters in
the file index.php (CVE-2008-0783).
- "local_graph_id" parameter in the file graph.php
(CVE-2008-0784).
- "graph_list" parameter in the file graph_view.php, "leaf_id" and
"id" parameters in the file tree.php, "local_graph_id" in the file
graph_xport.php (CVE-2008-0785).
Furthermore, CRLF injection attack are possible via unspecified vectors
(CVE-2008-0786).
A remote attacker could exploit these vulnerabilities, leading to path
disclosure, Cross-Site Scripting attacks, SQL injection, and HTTP
response splitting.
There is no known workaround at this time.
All Cacti users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/cacti-0.8.7b"
CVE-2008-0783
CVE-2008-0784
CVE-2008-0785
CVE-2008-0786
rbu
p-y
p-y