First published: Thu May 27 2010(Updated: )
SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | <=0.8.7e | |
Cacti | =0.5 | |
Cacti | =0.6 | |
Cacti | =0.6.1 | |
Cacti | =0.6.2 | |
Cacti | =0.6.3 | |
Cacti | =0.6.4 | |
Cacti | =0.6.5 | |
Cacti | =0.6.6 | |
Cacti | =0.6.7 | |
Cacti | =0.6.8 | |
Cacti | =0.6.8a | |
Cacti | =0.8 | |
Cacti | =0.8.1 | |
Cacti | =0.8.2 | |
Cacti | =0.8.2a | |
Cacti | =0.8.3 | |
Cacti | =0.8.3a | |
Cacti | =0.8.4 | |
Cacti | =0.8.5 | |
Cacti | =0.8.5a | |
Cacti | =0.8.6 | |
Cacti | =0.8.6a | |
Cacti | =0.8.6b | |
Cacti | =0.8.6c | |
Cacti | =0.8.6d | |
Cacti | =0.8.6f | |
Cacti | =0.8.6g | |
Cacti | =0.8.6h | |
Cacti | =0.8.6i | |
Cacti | =0.8.6j | |
Cacti | =0.8.6k | |
Cacti | =0.8.7 | |
Cacti | =0.8.7a | |
Cacti | =0.8.7b | |
Cacti | =0.8.7c | |
Cacti | =0.8.7d | |
<=0.8.7e | ||
=0.5 | ||
=0.6 | ||
=0.6.1 | ||
=0.6.2 | ||
=0.6.3 | ||
=0.6.4 | ||
=0.6.5 | ||
=0.6.6 | ||
=0.6.7 | ||
=0.6.8 | ||
=0.6.8a | ||
=0.8 | ||
=0.8.1 | ||
=0.8.2 | ||
=0.8.2a | ||
=0.8.3 | ||
=0.8.3a | ||
=0.8.4 | ||
=0.8.5 | ||
=0.8.5a | ||
=0.8.6 | ||
=0.8.6a | ||
=0.8.6b | ||
=0.8.6c | ||
=0.8.6d | ||
=0.8.6f | ||
=0.8.6g | ||
=0.8.6h | ||
=0.8.6i | ||
=0.8.6j | ||
=0.8.6k | ||
=0.8.7 | ||
=0.8.7a | ||
=0.8.7b | ||
=0.8.7c | ||
=0.8.7d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2092 is identified as a medium severity SQL injection vulnerability in Cacti.
To fix CVE-2010-2092, update to Cacti version 0.8.7 or later, where this vulnerability has been mitigated.
CVE-2010-2092 affects Cacti versions 0.8.7e and earlier, as well as several 0.5 to 0.8.x versions.
CVE-2010-2092 can be exploited by sending a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or cookie.
Exploitation of CVE-2010-2092 could allow an attacker to execute arbitrary SQL commands on the database.