ID CVE-2006-6799
Summary SQL injection vulnerability in Cacti 0.8.6i and earlier, when register_argc_argv is enabled, allows remote attackers to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php. NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.
References
Vulnerable Configurations
  • cpe:2.3:a:the_cacti_group:cacti:*:*:*:*:*:*:*:*
    cpe:2.3:a:the_cacti_group:cacti:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 17-10-2018 - 21:49)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 21799
bugtraq 20070118 Re: FW: [cacti-announce] Cacti 0.8.6j Released
confirm http://www.cacti.net/release_notes_0_8_6j.php
debian DSA-1250
exploit-db 3029
gentoo GLSA-200701-23
mandriva MDKSA-2007:015
openpkg OpenPKG-SA-2007.001
sectrack 1017451
secunia
  • 23528
  • 23665
  • 23917
  • 23941
suse SUSE-SA:2007:007
vupen ADV-2006-5193
xf cacti-cmd-sql-injection(31177)
Last major update 17-10-2018 - 21:49
Published 28-12-2006 - 21:28
Last modified 17-10-2018 - 21:49
Back to Top