An issue was discovered in Cacti 1.2.x through 1.2.16. A SQL injection vulnerability in data_debug.php allows remote authenticated attackers to execute arbitrary SQL commands via the site_id parameter. This can lead to remote code execution.
References
Link | Resource |
---|---|
https://github.com/Cacti/cacti/issues/4022 | Third Party Advisory |
https://asaf.me/2020/12/15/cacti-1-2-0-to-1-2-16-sql-injection/ | Exploit Third Party Advisory |
https://security.gentoo.org/glsa/202101-31 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBKBR2MFZJ6C2I4I5PCRR6UERPY24XZN/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DDD22Z56THHDTXAFM447UH3BVINURIF/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7DPUWZBAMCXFKAKUAJSHL3CKTOLGAK6/ | Third Party Advisory |
Information
Published : 2021-01-11 08:15
Updated : 2021-05-21 09:51
NVD link : CVE-2020-35701
Mitre link : CVE-2020-35701
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
cacti
- cacti
fedoraproject
- fedora