First published: Wed Jun 22 2005(Updated: )
PHP remote file inclusion vulnerability in config_settings.php in Cacti before 0.8.6e allows remote attackers to execute arbitrary PHP code via the config[include_path] parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | <=0.8.6d | |
Cacti | =0.5 | |
Cacti | =0.6 | |
Cacti | =0.6.1 | |
Cacti | =0.6.2 | |
Cacti | =0.6.3 | |
Cacti | =0.6.4 | |
Cacti | =0.6.5 | |
Cacti | =0.6.6 | |
Cacti | =0.6.7 | |
Cacti | =0.6.8 | |
Cacti | =0.6.8a | |
Cacti | =0.8 | |
Cacti | =0.8.1 | |
Cacti | =0.8.2 | |
Cacti | =0.8.2a | |
Cacti | =0.8.3 | |
Cacti | =0.8.3a | |
Cacti | =0.8.4 | |
Cacti | =0.8.5a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1526 is considered a high severity vulnerability that allows remote attackers to execute arbitrary PHP code.
To fix CVE-2005-1526, upgrade Cacti to version 0.8.6e or later, which addresses this vulnerability.
CVE-2005-1526 affects Cacti versions prior to 0.8.6e, including multiple earlier versions such as 0.8.5a and 0.6.x.
The impact of CVE-2005-1526 is the potential for remote code execution, which could compromise the affected system.
Yes, CVE-2005-1526 can still pose a risk if systems running vulnerable versions of Cacti are not updated.