(#Several vulnerabilities were reported in Cacti:#- CVE-2017-1000031: SQL injection. An authenticated remote attacker could exploit it by using URLs containing specially crafted SQL statements in order to potentially execute arbitrary SQL command on database server. This vulnerability is triggerable via the POST parameters "graph_template_input_id" and "graph_template_id" of the "cacti/graph_templates_inputs.php" web page##- CVE-2017-1000032: multiple cross-site scripting vulnerabilities. A remote attacker could exploit them by enticing their victim into following a specially crafted link in order to execute arbitrary JavaScript or HTML code. These vulnerabilities are triggerable via the GET parameter "parent_id" (cacti/tree.php?action=item_edit) and POST parameter "drp_action" (cacti/data_sources.php).##Proofs of concept are available.)
Vulnerable Products
Vulnerable Software: Cacti (The Cacti Group) - 0.8.8b