Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
TitleNew cacti packages fix SQL injection
Informations
NameDSA-2060First vendor Publication2010-06-13
VendorDebianLast vendor Modification2010-06-13
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stefan Esser discovered that cacti, a front-end to rrdtool for monitoring systems and services, is not properly validating input passed to the rra_id parameter of the graph.php script. Due to checking the input of $_REQUEST but using $_GET input in a query an unauthenticated attacker is able to perform SQL injections via a crafted rra_id $_GET value and an additional valid rra_id $_POST or $_COOKIE value.

For the stable distribution (lenny), this problem has been fixed in version 0.8.7b-2.1+lenny3.

For the testing distribution (squeeze), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in version 0.8.7e-4.

We recommend that you upgrade your cacti packages.

Original Source

Url : http://www.debian.org/security/2010/dsa-2060

CWE : Common Weakness Enumeration

idName
CWE-89Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:13352
 
Oval ID: oval:org.mitre.oval:def:13352
Title: DSA-2060-1 cacti -- insufficient input sanitisation
Description: Stefan Esser discovered that cacti, a front-end to rrdtool for monitoring systems and services, is not properly validating input passed to the rra_id parameter of the graph.php script. Due to checking the input of $_REQUEST but using $_GET input in a query an unauthenticated attacker is able to perform SQL injections via a crafted rra_id $_GET value and an additional valid rra_id $_POST or $_COOKIE value. For the stable distribution, this problem has been fixed in version 0.8.7b-2.1+lenny3. For the testing distribution, this problem will be fixed soon. For the unstable distribution, this problem has been fixed in version 0.8.7e-4. We recommend that you upgrade your cacti packages.
Family: unix Class: patch
Reference(s): DSA-2060-1
CVE-2010-2092
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): cacti
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11696
 
Oval ID: oval:org.mitre.oval:def:11696
Title: DSA-2060 cacti -- insufficient input sanitisation
Description: Stefan Esser discovered that cacti, a front-end to rrdtool for monitoring systems and services, is not properly validating input passed to the rra_id parameter of the graph.php script. Due to checking the input of $_REQUEST but using $_GET input in a query an unauthenticated attacker is able to perform SQL injections via a crafted rra_id $_GET value and an additional valid rra_id $_POST or $_COOKIE value.
Family: unix Class: patch
Reference(s): DSA-2060
CVE-2010-2092
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): cacti
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application37

OpenVAS Exploits

DateDescription
2010-07-06Name : Debian Security Advisory DSA 2060-1 (cacti)
File : nvt/deb_2060_1.nasl
2010-06-18Name : Mandriva Update for cacti MDVSA-2010:117 (cacti)
File : nvt/gb_mandriva_MDVSA_2010_117.nasl
2010-05-14Name : Cacti 'rra_id' Parameter SQL Injection Vulnerability
File : nvt/gb_cacti_40149.nasl
2010-04-16Name : Mandriva Update for flashplayer MDVA-2010:117 (flashplayer)
File : nvt/gb_mandriva_MDVA_2010_117.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
64964Cacti graph.php rra_id Parameter SQL Injection

Nessus® Vulnerability Scanner

DateDescription
2014-01-22Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201401-20.nasl - Type : ACT_GATHER_INFO
2010-06-14Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2060.nasl - Type : ACT_GATHER_INFO
2010-05-04Name : A web application hosted on the remote web server has multiple vulnerabilities.
File : cacti_087e.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2014-02-17 11:29:29
  • Multiple Updates