CVE-2010-2092

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.5:-:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.2a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*

History

21 Nov 2024, 01:15

Type Values Removed Values Added
References () http://php-security.org/2010/05/13/mops-2010-023-cacti-graph-viewer-sql-injection-vulnerability/index.html - Exploit () http://php-security.org/2010/05/13/mops-2010-023-cacti-graph-viewer-sql-injection-vulnerability/index.html - Exploit
References () http://secunia.com/advisories/41041 - () http://secunia.com/advisories/41041 -
References () http://www.cacti.net/changelog.php - () http://www.cacti.net/changelog.php -
References () http://www.debian.org/security/2010/dsa-2060 - () http://www.debian.org/security/2010/dsa-2060 -
References () http://www.vupen.com/english/advisories/2010/2132 - () http://www.vupen.com/english/advisories/2010/2132 -
References () https://rhn.redhat.com/errata/RHSA-2010-0635.html - () https://rhn.redhat.com/errata/RHSA-2010-0635.html -

Information

Published : 2010-05-27 22:30

Updated : 2024-11-21 01:15


NVD link : CVE-2010-2092

Mitre link : CVE-2010-2092

CVE.ORG link : CVE-2010-2092


JSON object : View

Products Affected

cacti

  • cacti
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')