First published: Wed Jul 06 2005(Updated: )
config.php in Cacti 0.8.6e and earlier allows remote attackers to set the no_http_headers switch, then modify session information to gain privileges and disable the use of addslashes to conduct SQL injection attacks.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | =0.8.5 | |
Cacti | =0.8.6b | |
Cacti | =0.8.6c | |
Cacti | =0.8.6a | |
Cacti | =0.8.2a | |
Cacti | =0.8.3a | |
Cacti | =0.8 | |
Cacti | =0.8.5a | |
Cacti | =0.8.4 | |
Cacti | =0.8.6 | |
Cacti | =0.8.3 | |
Cacti | =0.8.1 | |
Cacti | =0.8.2 | |
Cacti | =0.8.6d | |
Cacti | =0.8.6e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2149 is considered a medium severity vulnerability due to its potential for allowing privilege escalation and SQL injection.
To fix CVE-2005-2149, upgrade to Cacti version 0.8.6f or later, which contains security patches.
CVE-2005-2149 affects Cacti versions 0.8.6e and earlier, including versions 0.8.5 and 0.8.6d.
An attacker exploiting CVE-2005-2149 could modify session information and disable SQL input sanitization, leading to SQL injection attacks.
You can identify if your Cacti installation is vulnerable by checking your installed version against the affected versions listed in CVE-2005-2149.