First published: Mon Aug 16 2004(Updated: )
SQL injection vulnerability in auth_login.php in Cacti 0.8.5a allows remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | =0.6 | |
Cacti | =0.6.1 | |
Cacti | =0.6.2 | |
Cacti | =0.6.3 | |
Cacti | =0.6.4 | |
Cacti | =0.6.5 | |
Cacti | =0.6.6 | |
Cacti | =0.6.7 | |
Cacti | =0.6.8 | |
Cacti | =0.6.8a | |
Cacti | =0.8 | |
Cacti | =0.8.1 | |
Cacti | =0.8.2 | |
Cacti | =0.8.2a | |
Cacti | =0.8.3 | |
Cacti | =0.8.3a | |
Cacti | =0.8.4 | |
Cacti | =0.8.5 | |
Cacti | =0.8.5a | |
Gentoo Linux | =1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1737 has a medium severity level due to its potential for unauthorized SQL command execution.
To fix CVE-2004-1737, update Cacti to a version that is not vulnerable, specifically versions 0.8.5 or later.
CVE-2004-1737 affects Cacti versions from 0.6 to 0.8.5a.
Yes, CVE-2004-1737 can be exploited remotely by attackers using the username or password parameters.
CVE-2004-1737 can allow attackers to execute arbitrary SQL commands, potentially leading to authentication bypass.