First published: Thu Jul 03 2014(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote attackers to inject arbitrary web script or HTML via the (1) drp_action parameter to cdef.php, (2) data_input.php, (3) data_queries.php, (4) data_sources.php, (5) data_templates.php, (6) graph_templates.php, (7) graphs.php, (8) host.php, or (9) host_templates.php or the (10) graph_template_input_id or (11) graph_template_id parameter to graph_templates_inputs.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cacti | 1.2.16+ds1-2+deb11u3 1.2.24+ds1-1+deb12u2 1.2.27+ds1-2 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Cacti | =0.8.8b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4002 is classified as a moderate severity vulnerability due to its potential for exploitation via cross-site scripting.
CVE-2014-4002 affects Cacti version 0.8.8b and may also impact certain versions of Cacti within Debian and openSUSE distributions.
To mitigate CVE-2014-4002, upgrade to a secure version of Cacti that is patched against these XSS vulnerabilities.
CVE-2014-4002 can enable attackers to carry out cross-site scripting (XSS) attacks that may lead to session hijacking or redirecting users to malicious sites.
Users running vulnerable versions of Cacti, particularly version 0.8.8b, are susceptible to CVE-2014-4002.