Cacti

Cacti

140 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.67%
  • Veröffentlicht 12.04.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:40:44

Cacti before 1.1.37 has XSS because it does not properly reject unintended characters, related to use of the sanitize_uri function in lib/functions.php.

Exploit
  • EPSS 0.96%
  • Veröffentlicht 12.04.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:40:44

Cacti before 1.1.37 has XSS because it makes certain htmlspecialchars calls without the ENT_QUOTES flag (these calls occur when the html_escape function in lib/html.php is not used).

  • EPSS 0.55%
  • Veröffentlicht 24.11.2017 05:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

auth_login.php in Cacti before 1.0.0 allows remote authenticated users who use web authentication to bypass intended access restrictions by logging in as a user not in the cacti database, because the guest user is not considered. NOTE: this vulnerabi...

  • EPSS 1.1%
  • Veröffentlicht 15.11.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).

Exploit
  • EPSS 0.2%
  • Veröffentlicht 10.11.2017 23:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Cacti 1.1.27 has reflected XSS via the PATH_INFO to host.php.

Exploit
  • EPSS 1.46%
  • Veröffentlicht 08.11.2017 05:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header.

Exploit
  • EPSS 0.18%
  • Veröffentlicht 08.11.2017 05:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Cacti 1.1.27 allows remote authenticated administrators to read arbitrary files by placing the Log Path into a private directory, and then making a clog.php?filename= request, as demonstrated by filename=passwd (with a Log Path under /etc) to read /e...

Exploit
  • EPSS 0.47%
  • Veröffentlicht 07.11.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

lib/rrd.php in Cacti 1.1.27 allows remote authenticated administrators to execute arbitrary OS commands via the path_rrdtool parameter in an action=save request to settings.php.

Exploit
  • EPSS 0.31%
  • Veröffentlicht 11.10.2017 01:32:54
  • Zuletzt bearbeitet 20.04.2025 01:37:25

include/global_session.php in Cacti 1.1.25 has XSS related to (1) the URI or (2) the refresh page.

  • EPSS 0.34%
  • Veröffentlicht 21.08.2017 07:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

lib/html.php in Cacti before 1.1.18 has XSS via the title field of an external link added by an authenticated user.