First published: Wed Jun 22 2005(Updated: )
SQL injection vulnerability in config_settings.php for Cacti before 0.8.6e allows remote attackers to execute arbitrary SQL commands via the id parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | <=0.8.6d | |
Cacti | =0.5 | |
Cacti | =0.6 | |
Cacti | =0.6.1 | |
Cacti | =0.6.2 | |
Cacti | =0.6.3 | |
Cacti | =0.6.4 | |
Cacti | =0.6.5 | |
Cacti | =0.6.6 | |
Cacti | =0.6.7 | |
Cacti | =0.6.8 | |
Cacti | =0.6.8a | |
Cacti | =0.8 | |
Cacti | =0.8.1 | |
Cacti | =0.8.2 | |
Cacti | =0.8.2a | |
Cacti | =0.8.3 | |
Cacti | =0.8.3a | |
Cacti | =0.8.4 | |
Cacti | =0.8.5a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2005-1525 is considered high due to the potential for remote attackers to execute arbitrary SQL commands.
To fix CVE-2005-1525, you should upgrade to Cacti version 0.8.6e or later, which addresses the vulnerability.
CVE-2005-1525 affects Cacti versions before 0.8.6e, including versions 0.8.6d and earlier.
Using an affected version of Cacti without resolving CVE-2005-1525 poses a significant risk of SQL injection attacks that could compromise your system.
CVE-2005-1525 can allow remote attackers to execute arbitrary SQL commands, potentially leading to database corruption or unauthorized data access.