First published: Thu Feb 14 2008(Updated: )
Description of problem: Lack of input saintization can reportedly [1] [2] compose XSS, SQL injection or HTTP response splitting attack vector. [1] <a href="http://www.cacti.net/release_notes_0_8_7b.php">http://www.cacti.net/release_notes_0_8_7b.php</a> [2] <a href="http://secunia.com/advisories/28872/">http://secunia.com/advisories/28872/</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | =0.6.7 | |
Cacti | =0.8 | |
Cacti | =0.8.1 | |
Cacti | =0.8.2 | |
Cacti | =0.8.2a | |
Cacti | =0.8.3 | |
Cacti | =0.8.3a | |
Cacti | =0.8.4 | |
Cacti | =0.8.5 | |
Cacti | =0.8.5a | |
Cacti | =0.8.6c | |
Cacti | =0.8.6f | |
Cacti | =0.8.6i | |
Cacti | =0.8.6j | |
Cacti | =0.8.7 | |
Cacti | =0.8.7a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0785 is associated with input sanitization vulnerabilities which can lead to XSS, SQL injection, or HTTP response splitting attacks.
CVE-2008-0785 affects multiple versions of Cacti including 0.6.7 and versions starting from 0.8 up to 0.8.7a.
The impact of CVE-2008-0785 can result in unauthorized access to systems, data leakage, or data manipulation.
To fix CVE-2008-0785, upgrade to a secure version of Cacti that correctly implements input sanitization.
Yes, a patch is typically included in the newer releases of Cacti following the vulnerabilities addressed in CVE-2008-0785.