First published: Thu May 27 2010(Updated: )
SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | <=0.8.7e | |
Cacti | =0.5 | |
Cacti | =0.6 | |
Cacti | =0.6.1 | |
Cacti | =0.6.2 | |
Cacti | =0.6.3 | |
Cacti | =0.6.4 | |
Cacti | =0.6.5 | |
Cacti | =0.6.6 | |
Cacti | =0.6.7 | |
Cacti | =0.6.8 | |
Cacti | =0.6.8a | |
Cacti | =0.8 | |
Cacti | =0.8.1 | |
Cacti | =0.8.2 | |
Cacti | =0.8.2a | |
Cacti | =0.8.3 | |
Cacti | =0.8.3a | |
Cacti | =0.8.4 | |
Cacti | =0.8.5 | |
Cacti | =0.8.5a | |
Cacti | =0.8.6 | |
Cacti | =0.8.6a | |
Cacti | =0.8.6b | |
Cacti | =0.8.6c | |
Cacti | =0.8.6d | |
Cacti | =0.8.6f | |
Cacti | =0.8.6g | |
Cacti | =0.8.6h | |
Cacti | =0.8.6i | |
Cacti | =0.8.6j | |
Cacti | =0.8.6k | |
Cacti | =0.8.7 | |
Cacti | =0.8.7a | |
Cacti | =0.8.7b | |
Cacti | =0.8.7c | |
Cacti | =0.8.7d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2092 is identified as a medium severity SQL injection vulnerability in Cacti.
To fix CVE-2010-2092, update to Cacti version 0.8.7 or later, where this vulnerability has been mitigated.
CVE-2010-2092 affects Cacti versions 0.8.7e and earlier, as well as several 0.5 to 0.8.x versions.
CVE-2010-2092 can be exploited by sending a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or cookie.
Exploitation of CVE-2010-2092 could allow an attacker to execute arbitrary SQL commands on the database.