Raxnet Cacti全域可读Config.php文件漏洞

漏洞信息详情

Raxnet Cacti全域可读Config.php文件漏洞

漏洞简介

Cacti 0.6.8之前版本在config.php的纯文本中储存具有全域可读许可的MySQL用户名和密码。本地用户可以像Cacti用户一样修改数据库并可能提升特权。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: BID
名称: 5628
链接:http://www.securityfocus.com/bid/5628

来源: XF
名称: cacti-config-world-readable(10049)
链接:http://www.iss.net/security_center/static/10049.php

来源: BUGTRAQ
名称: 20020903 Cacti security issues
链接:http://archives.neohapsis.com/archives/bugtraq/2002-09/0028.html

来源: www.knights-of-the-routing-table.org
链接:http://www.knights-of-the-routing-table.org/advisories/krt_001_20020903_cacti.txt

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享