RaXnet Cacti Auth_Login.PHP SQL注入漏洞

漏洞信息详情

RaXnet Cacti Auth_Login.PHP SQL注入漏洞

漏洞简介

Cacti 0.8.5a 版本中的auth_login.php存在SQL注入漏洞。远程攻击者可以通过(1) username参数或 (2) password参数执行任意SQL命令和绕过验证。

漏洞公告

It is reported that this vulnerability is addressed in the CVS release. This is not confirmed.
Gentoo has released advisory GLSA 200408-21 dealing with this issue. Users are advised to upgrade to the latest available version of Cacti using the following sequence of commands:
# emerge sync
# emerge -pv “>=net-analyzer/cacti-0.8.5a-r1”
# emerge “>=net-analyzer/cacti-0.8.5a-r1”
Please see the referenced Gentoo advisory for more information.
Gentoo has released an update to the above-mentioned advisory; the workaround section has been updated. Please see the referenced advisory for more information.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: XF
名称: cacti-authlogin-sql-injection(17011)
链接:http://xforce.iss.net/xforce/xfdb/17011

来源: BID
名称: 10960
链接:http://www.securityfocus.com/bid/10960

来源: GENTOO
名称: GLSA-200408-21
链接:http://www.gentoo.org/security/en/glsa/glsa-200408-21.xml

来源: SECUNIA
名称: 12308
链接:http://secunia.com/advisories/12308

来源: BUGTRAQ
名称: 20040816 SQL Injection in CACTI
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=109272483621038&w=2

来源: FULLDISC
名称: 20040816 SQL Injection in CACTI
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025376.html

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享