Multiple SQL injection vulnerabilities in graph_xport.php in Cacti 0.8.7g, 0.8.8b, and earlier allow remote attackers to execute arbitrary SQL commands via the (1) graph_start, (2) graph_end, (3) graph_height, (4) graph_width, (5) graph_nolegend, (6) print_source, (7) local_graph_id, or (8) rra_id parameter.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131821.html | vendor advisory |
http://bugs.cacti.net/view.php?id=2405 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/92278 | vdb entry |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768 | |
http://www.securityfocus.com/bid/66555 | vdb entry |
http://svn.cacti.net/viewvc?view=rev&revision=7439 | patch |
http://secunia.com/advisories/59203 | third party advisory |
http://seclists.org/oss-sec/2014/q2/2 | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131842.html | vendor advisory |
http://seclists.org/oss-sec/2014/q2/15 | mailing list |
http://secunia.com/advisories/57647 | third party advisory |
http://www.debian.org/security/2014/dsa-2970 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1084258 | |
https://security.gentoo.org/glsa/201509-03 | vendor advisory |