An issue was discovered in Cacti 1.2.x through 1.2.16. A SQL injection vulnerability in data_debug.php allows remote authenticated attackers to execute arbitrary SQL commands via the site_id parameter. This can lead to remote code execution.
References
Configurations
History
21 Nov 2024, 05:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://asaf.me/2020/12/15/cacti-1-2-0-to-1-2-16-sql-injection/ - Exploit, Third Party Advisory | |
References | () https://github.com/Cacti/cacti/issues/4022 - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DDD22Z56THHDTXAFM447UH3BVINURIF/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7DPUWZBAMCXFKAKUAJSHL3CKTOLGAK6/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NBKBR2MFZJ6C2I4I5PCRR6UERPY24XZN/ - | |
References | () https://security.gentoo.org/glsa/202101-31 - Third Party Advisory |
07 Nov 2023, 03:22
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-01-11 16:15
Updated : 2024-11-21 05:27
NVD link : CVE-2020-35701
Mitre link : CVE-2020-35701
CVE.ORG link : CVE-2020-35701
JSON object : View
Products Affected
fedoraproject
- fedora
cacti
- cacti
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')