This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200803-18
(Cacti: Multiple vulnerabilities)
The following inputs are not properly sanitized before being processed:
'view_type' parameter in the file graph.php, 'filter' parameter
in the file graph_view.php, 'action' and 'login_username' parameters in
the file index.php (CVE-2008-0783).
'local_graph_id' parameter in the file graph.php
'graph_list' parameter in the file graph_view.php, 'leaf_id' and
'id' parameters in the file tree.php, 'local_graph_id' in the file
Furthermore, CRLF injection attack are possible via unspecified vectors
A remote attacker could exploit these vulnerabilities, leading to path
disclosure, Cross-Site Scripting attacks, SQL injection, and HTTP
There is no known workaround at this time.
See also :
All Cacti users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-analyzer/cacti-0.8.7b'
Risk factor :
High / CVSS Base Score : 7.5
Family: Gentoo Local Security Checks
Nessus Plugin ID: 31444 (gentoo_GLSA-200803-18.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now