Cacti

Cacti

137 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.97%
  • Veröffentlicht 12.11.2020 14:15:22
  • Zuletzt bearbeitet 21.11.2024 05:18:32

A cross-site scripting (XSS) vulnerability exists in templates_import.php (Cacti 1.2.13) due to Improper escaping of error message during template import preview in the xml_path field

Exploit
  • EPSS 81.2%
  • Veröffentlicht 17.06.2020 14:15:10
  • Zuletzt bearbeitet 21.11.2024 05:02:56

A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.

Exploit
  • EPSS 0.8%
  • Veröffentlicht 20.05.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:50

In Cacti before 1.2.11, disabling a user account does not immediately invalidate any permissions granted to that account (e.g., permission to view logs).

Exploit
  • EPSS 0.46%
  • Veröffentlicht 20.05.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:51

In Cacti before 1.2.11, auth_profile.php?action=edit allows CSRF for an admin email change.

Exploit
  • EPSS 94.14%
  • Veröffentlicht 22.02.2020 02:15:10
  • Zuletzt bearbeitet 21.11.2024 05:39:29

graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.

  • EPSS 16.16%
  • Veröffentlicht 21.01.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:32:09

Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can ...

Exploit
  • EPSS 46.81%
  • Veröffentlicht 20.01.2020 05:15:11
  • Zuletzt bearbeitet 21.11.2024 05:36:53

Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, an...

Exploit
  • EPSS 4.09%
  • Veröffentlicht 16.01.2020 04:15:11
  • Zuletzt bearbeitet 21.11.2024 05:36:38

Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string fr...

Exploit
  • EPSS 0.92%
  • Veröffentlicht 15.01.2020 07:15:12
  • Zuletzt bearbeitet 21.11.2024 05:36:35

data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm.

Exploit
  • EPSS 2.42%
  • Veröffentlicht 12.12.2019 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:32:10

Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti ...