CVE-2019-17357
Published: 21 January 2020
Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can exploit this to extract data from the database, or an unauthenticated remote attacker could exploit this via Cross-Site Request Forgery.
From the Ubuntu Security Team
It was discovered that Cacti has an SQL injection vulnerability affecting how template identifiers are handled. An authenticated attacker can exploit this to extract data from the database, or an unauthenticated remote attacker could exploit this via Cross-Site Request Forgery.
Priority
Status
Package | Release | Status |
---|---|---|
cacti Launchpad, Ubuntu, Debian |
bionic |
Needed
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Not vulnerable
(1.2.10+ds1-1ubuntu1)
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
impish |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
jammy |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
kinetic |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
lunar |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
mantic |
Not vulnerable
(1.2.16+ds1-2ubuntu1)
|
|
trusty |
Needs triage
|
|
upstream |
Released
(1.2.8)
|
|
xenial |
Needed
|
|
Patches: upstream: https://github.com/Cacti/cacti/commit/d6dc48503bbcde0717e7a93df7638fd4796200f4 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |