First published: Wed Dec 25 2019(Updated: )
Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can exploit this to extract data from the database, or an unauthenticated remote attacker could exploit this via Cross-Site Request Forgery.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | <=1.2.7 | |
debian/cacti | 1.2.16+ds1-2+deb11u3 1.2.24+ds1-1+deb12u2 1.2.27+ds1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17357 is a SQL injection vulnerability in Cacti through 1.2.7 that allows an authenticated attacker to extract data from the database.
CVE-2019-17357 has a severity rating of 6.5 (High).
CVE-2019-17357 affects Cacti versions 1.2.2+ds1-2+deb10u4, 1.2.2+ds1-2+deb10u5, 1.2.16+ds1-2+deb11u1, 1.2.24+ds1-1, and 1.2.25+ds1-2.
An authenticated attacker can exploit CVE-2019-17357 by using a specially crafted URL to perform SQL injection and extract data from the database.
Yes, the fix for CVE-2019-17357 is to upgrade to a patched version of Cacti, such as 1.2.2+ds1-2+deb10u6 or 1.2.7+ds1-1.