Vulnerability Description
SQL injection vulnerability in auth_login.php in Cacti before 0.8.7h allows remote attackers to execute arbitrary SQL commands via the login_username parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cacti | Cacti | <= 0.8.7g |
Related Weaknesses (CWE)
References
- http://bugs.cacti.net/view.php?id=2062
- http://forums.cacti.net/viewtopic.php?f=21&t=44116
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069126.h
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069137.h
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069141.h
- http://secunia.com/advisories/44133Vendor Advisory
- http://secunia.com/advisories/46876Vendor Advisory
- http://svn.cacti.net/viewvc?view=rev&revision=6807
- http://www.cacti.net/release_notes_0_8_7h.php
- http://www.securityfocus.com/bid/50671
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71326
- http://bugs.cacti.net/view.php?id=2062
- http://forums.cacti.net/viewtopic.php?f=21&t=44116
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069126.h
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069137.h
FAQ
What is CVE-2011-4824?
CVE-2011-4824 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in auth_login.php in Cacti before 0.8.7h allows remote attackers to execute arbitrary SQL commands via the login_username parameter.
How severe is CVE-2011-4824?
CVE-2011-4824 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-4824?
Check the references section above for vendor advisories and patch information. Affected products include: Cacti Cacti.