Cacti < 0.8.6e Multiple Vulnerabilities

high Nessus Plugin ID 81601

Synopsis

The remote web server is running a PHP application that is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the Cacti application running on the remote web server is prior to version 0.8.6e. It is, therefore, potentially affected by the following vulnerabilities :

- A PHP file inclusion vulnerability exists in 'top_graph_header.php' that allows remote attackers to execute arbitrary PHP code using the 'config[library_path]' parameter. (CVE-2005-1524)

- A SQLi vulnerability exists in 'config_settings.php' that allows remote attackers to execute arbitrary SQL commands using the 'id' parameter. (CVE-2005-1525)

- A PHP remote file inclusion vulnerability exists in 'config_settings.php' that allows remote attackers to execute arbitrary PHP code using the 'config[include_path]' parameter. (CVE-2005-1526)

Solution

Upgrade to Cacti 0.8.6e or later.

See Also

http://www.cacti.net/release_notes_0_8_6e.php

https://www.securityfocus.com/archive/1/403174/30/0/threaded

Plugin Details

Severity: High

ID: 81601

File Name: cacti_086e_vcheck.nasl

Version: 1.5

Type: remote

Family: CGI abuses

Published: 3/3/2015

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:cacti:cacti

Required KB Items: www/PHP, Settings/ParanoidReport, installed_sw/cacti

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/22/2005

Vulnerability Publication Date: 6/22/2005

Exploitable With

Metasploit (Cacti graph_view.php Remote Command Execution)

Reference Information

CVE: CVE-2005-1524, CVE-2005-1525, CVE-2005-1526

BID: 14027, 14028, 14030, 14042, 14128, 14129