First published: Tue Apr 22 2003(Updated: )
Cacti before 0.6.8 stores a MySQL username and password in plaintext in config.php, which has world-readable permissions, which allows local users to modify databases as the Cacti user and possibly gain privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | =0.5 | |
Cacti | =0.6.7 | |
Cacti | =0.6.4 | |
Cacti | =0.6.1 | |
Cacti | =0.6 | |
Cacti | =0.6.6 | |
Cacti | =0.6.5 | |
Cacti | =0.6.3 | |
Cacti | =0.6.8 | |
Cacti | =0.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1479 is considered a critical vulnerability due to its potential for local users to gain unauthorized access and modify databases.
To fix CVE-2002-1479, update to Cacti version 0.6.8 or later and ensure that config.php has appropriate file permissions.
CVE-2002-1479 affects Cacti versions 0.5, 0.6.1 to 0.6.7, and earlier versions prior to 0.6.8.
CVE-2002-1479 exposes MySQL database credentials stored in plaintext in a publicly readable configuration file.
Yes, CVE-2002-1479 can lead to privilege escalation as local users can modify databases as the Cacti user.