漏洞信息详情
Cacti SQL注入漏洞
漏洞简介
Cacti是Cacti团队的一套开源的网络流量监测和分析工具。该工具通过snmpget来获取数据,使用RRDtool绘画图形进行分析,并提供数据和用户管理功能。
Cacti 1.2.12版本中的color.php文件存在SQL注入漏洞。远程攻击者可借助‘filter’参数利用该漏洞执行任意命令。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://www.cacti.net/
参考网址
来源:MISC
链接:https://github.com/Cacti/cacti/issues/3622
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/W64CIB6L4HZRVQSWKPDDKXJO4J2XTOXD/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
来源:MISC
链接:https://packetstormsecurity.com/files/162918/Cacti-1.2.12-SQL-Injection-Remote-Command-Execution.html
来源:GENTOO
链接:https://security.gentoo.org/glsa/202007-03
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
来源:MISC
链接:https://packetstormsecurity.com/files/162384/Cacti-1.2.12-SQL-Injection-Remote-Code-Execution.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/ZKM5G3YNSZDHDZMPCMAHG5B5M2V4XYSE/
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/48643
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162384/Cacti-1.2.12-SQL-Injection-Remote-Code-Execution.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158555/Gentoo-Linux-Security-Advisory-202007-03.html
来源:cxsecurity.com
链接:https://cxsecurity.com/issue/WLB-2021040160
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Cacti-SQL-injection-via-Editing-Colors-32795
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-14295
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162918/Cacti-1.2.12-SQL-Injection-Remote-Command-Execution.html
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/49810
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...