Description
|
|
Multiple vulnerabilities were identified in Cacti, which could be exploited by remote attackers to execute arbitrary commands or conduct SQL injection attacks.
- The first issue is due to an input validation error in the "top_graph_header.php" file that does not properly filter the "config[library_path]" variable, which could be exploited by remote attakers to include malicious PHP scripts and execute arbitrary commands with the privileges of the web server.
- The second vulnerability is due to an input validation error in the "config_settings.php" file that does not properly filter the "config[include_path]" variable, which could be exploited by remote attakers to include malicious PHP scripts and execute arbitrary commands with the privileges of the web server.
- The third flaw resides in the "config_settings.php" sript that does not properly filter user-supplied input, which could be exploited by remote attackers to execute arbitrary SQL commands.
|