First published: Wed Jun 22 2005(Updated: )
PHP file inclusion vulnerability in top_graph_header.php in Cacti 0.8.6d and possibly earlier versions allows remote attackers to execute arbitrary PHP code via the config[library_path] parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | <=0.8.6d | |
Cacti | =0.5 | |
Cacti | =0.6 | |
Cacti | =0.6.1 | |
Cacti | =0.6.2 | |
Cacti | =0.6.3 | |
Cacti | =0.6.4 | |
Cacti | =0.6.5 | |
Cacti | =0.6.6 | |
Cacti | =0.6.7 | |
Cacti | =0.6.8 | |
Cacti | =0.6.8a | |
Cacti | =0.8 | |
Cacti | =0.8.1 | |
Cacti | =0.8.2 | |
Cacti | =0.8.2a | |
Cacti | =0.8.3 | |
Cacti | =0.8.3a | |
Cacti | =0.8.4 | |
Cacti | =0.8.5a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1524 is considered a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2005-1524, upgrade Cacti to version 0.8.6e or later.
CVE-2005-1524 affects Cacti versions up to and including 0.8.6d, as well as earlier versions.
CVE-2005-1524 is a PHP file inclusion vulnerability.
Yes, CVE-2005-1524 can be exploited remotely by attackers to execute arbitrary PHP code.