First published: Wed Jun 17 2020(Updated: )
A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti Cacti | =1.2.12 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14295 is a SQL injection issue in color.php in Cacti 1.2.12 that allows an admin to inject SQL via the filter parameter, leading to remote command execution.
Cacti 1.2.12 and Fedoraproject Fedora 31 and 32 are affected by CVE-2020-14295.
CVE-2020-14295 has a severity rating of 7.2 (high).
CVE-2020-14295 can be exploited by injecting SQL via the filter parameter in color.php.
Yes, you can find references for CVE-2020-14295 at the following links: [1](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html), [2](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html), [3](http://packetstormsecurity.com/files/162384/Cacti-1.2.12-SQL-Injection-Remote-Code-Execution.html).