First published: Thu Dec 28 2006(Updated: )
SQL injection vulnerability in Cacti 0.8.6i and earlier, when register_argc_argv is enabled, allows remote attackers to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php. NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | <=0.8.6i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-6799 is considered high due to its ability to allow remote SQL command execution.
To fix CVE-2006-6799, upgrade to a version of Cacti later than 0.8.6i or disable register_argc_argv in the PHP configuration.
CVE-2006-6799 can allow attackers to execute arbitrary SQL commands, potentially leading to data breaches or system compromise.
CVE-2006-6799 affects Cacti versions up to and including 0.8.6i.
Yes, CVE-2006-6799 can be exploited remotely if the affected version of Cacti is exposed to the internet.