First published: Wed Apr 23 2014(Updated: )
Cross-site request forgery (CSRF) vulnerability in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to hijack the authentication of users for unspecified commands, as demonstrated by requests that (1) modify binary files, (2) modify configurations, or (3) add arbitrary users.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cacti | 1.2.16+ds1-2+deb11u3 1.2.24+ds1-1+deb12u2 1.2.27+ds1-2 | |
Cacti | >=0.8.7<=0.8.7g | |
Cacti | >=0.8.8<=0.8.8b | |
Debian | =7.0 | |
Debian | =8.0 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2327 is classified as a medium severity vulnerability due to its potential for exploitation through cross-site request forgery.
To fix CVE-2014-2327, upgrade to Cacti versions 1.2.16+ds1-2+deb11u3, 1.2.24+ds1-1+deb12u2, or 1.2.27+ds1-2.
CVE-2014-2327 affects Cacti versions 0.8.7g, 0.8.8b, and earlier.
CVE-2014-2327 allows attackers to exploit user authentication to modify binary files, configurations, or add arbitrary users.
No, CVE-2014-2327 is specifically a cross-site request forgery (CSRF) vulnerability.