Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).
References
Link | Resource |
---|---|
https://www.cacti.net/release_notes_1_0_0.php | Issue Tracking Release Notes Vendor Advisory |
https://security-tracker.debian.org/tracker/CVE-2014-4000 | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/201711-10 | Issue Tracking Third Party Advisory |
https://forums.cacti.net/viewtopic.php?f=4&t=56794 | Issue Tracking Release Notes Vendor Advisory |
Configurations
Information
Published : 2017-11-15 08:29
Updated : 2017-11-29 10:00
NVD link : CVE-2014-4000
Mitre link : CVE-2014-4000
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
cacti
- cacti