Upstream information
Description
Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 7.5 | 
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P | 
| Access Vector | Network | 
| Access Complexity | Low | 
| Authentication | None | 
| Confidentiality Impact | Partial | 
| Integrity Impact | Partial | 
| Availability Impact | Partial | 
SUSE Security Advisories:
- SUSE-SR:2005:017, published Wed, 13 Jul 2005 11:00:00 +0000
 
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 01:35:23 2013CVE page last modified: Mon Oct 6 18:14:40 2025