#VU32836 SQL injection in Cacti - CVE-2011-4824
Published: December 15, 2011 / Updated: July 28, 2020
Cacti
The Cacti Group, Inc.
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the login_username parameter. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- http://bugs.cacti.net/view.php?id=2062
- http://forums.cacti.net/viewtopic.php?f=21&t=44116
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069126.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069137.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069141.html
- http://secunia.com/advisories/44133
- http://secunia.com/advisories/46876
- http://svn.cacti.net/viewvc?view=rev&revision=6807
- http://www.cacti.net/release_notes_0_8_7h.php
- http://www.securityfocus.com/bid/50671
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71326