CVE-2005-2148 Affecting cacti package, versions <0.8.6f-1


Severity

Recommended
0.0
high
0
10

Based on Debian security rating.

Threat Intelligence

EPSS
2.6% (91st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-CACTI-5676222
  • published6 Jul 2005
  • disclosed6 Jul 2005

Introduced: 6 Jul 2005

CVE-2005-2148  (opens in a new tab)

How to fix?

Upgrade Debian:13 cacti to version 0.8.6f-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cacti package and not the cacti package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.

CVSS Scores

version 3.1