7.5

CVE-2005-2148

Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.

Data is provided by the National Vulnerability Database (NVD)
The Cacti GroupCacti Version0.8
The Cacti GroupCacti Version0.8.1
The Cacti GroupCacti Version0.8.2
The Cacti GroupCacti Version0.8.2a
The Cacti GroupCacti Version0.8.3
The Cacti GroupCacti Version0.8.3a
The Cacti GroupCacti Version0.8.4
The Cacti GroupCacti Version0.8.5
The Cacti GroupCacti Version0.8.5a
The Cacti GroupCacti Version0.8.6
The Cacti GroupCacti Version0.8.6a
The Cacti GroupCacti Version0.8.6b
The Cacti GroupCacti Version0.8.6c
The Cacti GroupCacti Version0.8.6d
The Cacti GroupCacti Version0.8.6e
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 4.13% 0.875
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P