CVE-2010-2545

Multiple cross-site scripting (XSS) vulnerabilities in Cacti before 0.8.7g, as used in Red Hat High Performance Computing (HPC) Solution and other products, allow remote attackers to inject arbitrary web script or HTML via (1) the name element in an XML template to templates_import.php; and allow remote authenticated administrators to inject arbitrary web script or HTML via vectors related to (2) cdef.php, (3) data_input.php, (4) data_queries.php, (5) data_sources.php, (6) data_templates.php, (7) gprint_presets.php, (8) graph.php, (9) graphs_new.php, (10) graphs.php, (11) graph_templates_inputs.php, (12) graph_templates_items.php, (13) graph_templates.php, (14) graph_view.php, (15) host.php, (16) host_templates.php, (17) lib/functions.php, (18) lib/html_form.php, (19) lib/html_form_template.php, (20) lib/html.php, (21) lib/html_tree.php, (22) lib/rrd.php, (23) rra.php, (24) tree.php, and (25) user_admin.php.
References
Link Resource
http://cacti.net/release_notes_0_8_7g.php Vendor Advisory
http://marc.info/?l=oss-security&m=127978954522586&w=2
http://marc.info/?l=oss-security&m=128017203704299&w=2
http://secunia.com/advisories/41041 Vendor Advisory
http://svn.cacti.net/viewvc?view=rev&revision=6037
http://svn.cacti.net/viewvc?view=rev&revision=6038
http://svn.cacti.net/viewvc?view=rev&revision=6041
http://svn.cacti.net/viewvc?view=rev&revision=6042
http://www.mandriva.com/security/advisories?name=MDVSA-2010:160
http://www.securityfocus.com/bid/42575 Exploit
http://www.vupen.com/english/advisories/2010/2132
https://bugzilla.redhat.com/show_bug.cgi?id=459229
https://exchange.xforce.ibmcloud.com/vulnerabilities/61227
https://rhn.redhat.com/errata/RHSA-2010-0635.html
http://cacti.net/release_notes_0_8_7g.php Vendor Advisory
http://marc.info/?l=oss-security&m=127978954522586&w=2
http://marc.info/?l=oss-security&m=128017203704299&w=2
http://secunia.com/advisories/41041 Vendor Advisory
http://svn.cacti.net/viewvc?view=rev&revision=6037
http://svn.cacti.net/viewvc?view=rev&revision=6038
http://svn.cacti.net/viewvc?view=rev&revision=6041
http://svn.cacti.net/viewvc?view=rev&revision=6042
http://www.mandriva.com/security/advisories?name=MDVSA-2010:160
http://www.securityfocus.com/bid/42575 Exploit
http://www.vupen.com/english/advisories/2010/2132
https://bugzilla.redhat.com/show_bug.cgi?id=459229
https://exchange.xforce.ibmcloud.com/vulnerabilities/61227
https://rhn.redhat.com/errata/RHSA-2010-0635.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.5:-:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.2a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*

History

21 Nov 2024, 01:16

Type Values Removed Values Added
References () http://cacti.net/release_notes_0_8_7g.php - Vendor Advisory () http://cacti.net/release_notes_0_8_7g.php - Vendor Advisory
References () http://marc.info/?l=oss-security&m=127978954522586&w=2 - () http://marc.info/?l=oss-security&m=127978954522586&w=2 -
References () http://marc.info/?l=oss-security&m=128017203704299&w=2 - () http://marc.info/?l=oss-security&m=128017203704299&w=2 -
References () http://secunia.com/advisories/41041 - Vendor Advisory () http://secunia.com/advisories/41041 - Vendor Advisory
References () http://svn.cacti.net/viewvc?view=rev&revision=6037 - () http://svn.cacti.net/viewvc?view=rev&revision=6037 -
References () http://svn.cacti.net/viewvc?view=rev&revision=6038 - () http://svn.cacti.net/viewvc?view=rev&revision=6038 -
References () http://svn.cacti.net/viewvc?view=rev&revision=6041 - () http://svn.cacti.net/viewvc?view=rev&revision=6041 -
References () http://svn.cacti.net/viewvc?view=rev&revision=6042 - () http://svn.cacti.net/viewvc?view=rev&revision=6042 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:160 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:160 -
References () http://www.securityfocus.com/bid/42575 - Exploit () http://www.securityfocus.com/bid/42575 - Exploit
References () http://www.vupen.com/english/advisories/2010/2132 - () http://www.vupen.com/english/advisories/2010/2132 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=459229 - () https://bugzilla.redhat.com/show_bug.cgi?id=459229 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/61227 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/61227 -
References () https://rhn.redhat.com/errata/RHSA-2010-0635.html - () https://rhn.redhat.com/errata/RHSA-2010-0635.html -

Information

Published : 2010-08-23 22:00

Updated : 2024-11-21 01:16


NVD link : CVE-2010-2545

Mitre link : CVE-2010-2545

CVE.ORG link : CVE-2010-2545


JSON object : View

Products Affected

cacti

  • cacti
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')