cvelist/2005/2xxx/CVE-2005-2148.json
2019-03-18 02:52:08 +00:00

127 lines
4.7 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2005-2148",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.cacti.net/downloads/patches/0.8.6e/cacti-0.8.6f_security.patch",
"refsource": "CONFIRM",
"url": "http://www.cacti.net/downloads/patches/0.8.6e/cacti-0.8.6f_security.patch"
},
{
"name": "cacti-request-array-command-execution(21270)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21270"
},
{
"name": "http://www.hardened-php.net/advisory-032005.php",
"refsource": "MISC",
"url": "http://www.hardened-php.net/advisory-032005.php"
},
{
"name": "20050702 Advisory 04/2005: Cacti Remote Command Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/404047/30/30/threaded"
},
{
"name": "20050702 Advisory 03/2005: Cacti Multiple SQL Injection Vulnerabilities [FIXED]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/404054"
},
{
"name": "[cacti-announce] 20050701 Cacti 0.8.6f Released",
"refsource": "MLIST",
"url": "http://sourceforge.net/mailarchive/forum.php?forum_id=10360&max_rows=25&style=flat&viewmonth=200507&viewday=1"
},
{
"name": "cacti-graph-post-cookie-sql-injection(21266)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21266"
},
{
"name": "ADV-2005-0951",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/0951"
},
{
"name": "DSA-764",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-764"
},
{
"name": "14128",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14128"
},
{
"name": "15490",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15490"
},
{
"name": "1014361",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014361"
},
{
"name": "14129",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14129"
},
{
"name": "http://www.hardened-php.net/advisory-042005.php",
"refsource": "MISC",
"url": "http://www.hardened-php.net/advisory-042005.php"
}
]
}
}