First published: Wed Nov 15 2017(Updated: )
Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cacti | 1.2.2+ds1-2+deb10u4 1.2.2+ds1-2+deb10u5 1.2.16+ds1-2+deb11u1 1.2.24+ds1-1 1.2.25+ds1-2 | |
Cacti | <1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4000 is considered a significant vulnerability due to its potential for PHP object injection and remote code execution.
To fix CVE-2014-4000, update Cacti to version 1.0.0 or later, ensuring that no affected versions are in use.
CVE-2014-4000 affects all Cacti installations prior to version 1.0.0 that allow remote authenticated users to input crafted serialized objects.
CVE-2014-4000 enables remote authenticated users to conduct PHP object injection attacks, leading to execution of arbitrary PHP code.
Versions of Cacti prior to 1.0.0 are vulnerable to CVE-2014-4000.