CVE-2013-1435

(1) snmp.php and (2) rrd.php in Cacti before 0.8.8b allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.2a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6e:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7h:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7i:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.8:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.8a:*:*:*:*:*:*:*

History

21 Nov 2024, 01:49

Type Values Removed Values Added
References () http://forums.cacti.net/viewtopic.php?f=21&t=50593 - () http://forums.cacti.net/viewtopic.php?f=21&t=50593 -
References () http://lists.opensuse.org/opensuse-updates/2013-08/msg00053.html - () http://lists.opensuse.org/opensuse-updates/2013-08/msg00053.html -
References () http://secunia.com/advisories/54181 - () http://secunia.com/advisories/54181 -
References () http://secunia.com/advisories/54386 - Vendor Advisory () http://secunia.com/advisories/54386 - Vendor Advisory
References () http://svn.cacti.net/viewvc?view=rev&revision=7392 - () http://svn.cacti.net/viewvc?view=rev&revision=7392 -
References () http://svn.cacti.net/viewvc?view=rev&revision=7393 - Patch () http://svn.cacti.net/viewvc?view=rev&revision=7393 - Patch
References () http://www.debian.org/security/2012/dsa-2739 - () http://www.debian.org/security/2012/dsa-2739 -
References () http://www.openwall.com/lists/oss-security/2013/08/07/15 - () http://www.openwall.com/lists/oss-security/2013/08/07/15 -

Information

Published : 2013-08-23 16:55

Updated : 2024-11-21 01:49


NVD link : CVE-2013-1435

Mitre link : CVE-2013-1435

CVE.ORG link : CVE-2013-1435


JSON object : View

Products Affected

cacti

  • cacti
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')