Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://security-tracker.debian.org/tracker/CVE-2014-4000 | issue tracking third party advisory |
https://forums.cacti.net/viewtopic.php?f=4&t=56794 | issue tracking release notes vendor advisory |
https://security.gentoo.org/glsa/201711-10 | issue tracking third party advisory vendor advisory |
https://www.cacti.net/release_notes_1_0_0.php | issue tracking release notes vendor advisory |