CVE-2014-5261

The graph settings script (graph_settings.php) in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a font size, related to the rrdtool commandline in lib/rrd.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.6e:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.7i:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.8:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.8a:*:*:*:*:*:*:*

History

21 Nov 2024, 02:11

Type Values Removed Values Added
References () http://seclists.org/oss-sec/2014/q3/351 - () http://seclists.org/oss-sec/2014/q3/351 -
References () http://seclists.org/oss-sec/2014/q3/386 - () http://seclists.org/oss-sec/2014/q3/386 -
References () http://svn.cacti.net/viewvc?view=rev&revision=7454 - Patch () http://svn.cacti.net/viewvc?view=rev&revision=7454 - Patch
References () http://www.debian.org/security/2014/dsa-3007 - () http://www.debian.org/security/2014/dsa-3007 -
References () http://www.securityfocus.com/bid/69213 - () http://www.securityfocus.com/bid/69213 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1127165 - () https://bugzilla.redhat.com/show_bug.cgi?id=1127165 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/95292 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/95292 -
References () https://security.gentoo.org/glsa/201607-05 - () https://security.gentoo.org/glsa/201607-05 -

Information

Published : 2014-08-22 14:55

Updated : 2024-11-21 02:11


NVD link : CVE-2014-5261

Mitre link : CVE-2014-5261

CVE.ORG link : CVE-2014-5261


JSON object : View

Products Affected

cacti

  • cacti
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')