Vulnerabilities > CVE-2004-1737 - SQL Injection vulnerability in RaXnet Cacti Auth_Login.PHP

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
the-cacti-group
gentoo
nessus
exploit available

Summary

SQL injection vulnerability in auth_login.php in Cacti 0.8.5a allows remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters.

Exploit-Db

descriptionRaXnet Cacti 0.6.x/0.8.x Auth_Login.PHP SQL Injection Vulnerability. CVE-2004-1737. Webapps exploit for php platform
idEDB-ID:24375
last seen2016-02-02
modified2004-07-16
published2004-07-16
reporterFernando Quintero
sourcehttps://www.exploit-db.com/download/24375/
titleRaXnet Cacti 0.6.x/0.8.x - Auth_Login.PHP SQL Injection Vulnerability

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200408-21.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200408-21 (Cacti: SQL injection vulnerability) Cacti is vulnerable to a SQL injection attack where an attacker may inject SQL into the Username field. Impact : An attacker could compromise the Cacti service and potentially execute programs with the permissions of the user running Cacti. Only systems with php_flag magic_quotes_gpc set to Off are vulnerable. By default, Gentoo Linux installs PHP with this option set to On. Workaround : There is no known workaround at this time. All users are encouraged to upgrade to the latest available version of Cacti.
last seen2020-06-01
modified2020-06-02
plugin id14577
published2004-08-30
reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/14577
titleGLSA-200408-21 : Cacti: SQL injection vulnerability