Vulnerabilities > CVE-2006-6799 - Remote Command Execution vulnerability in Cacti CMD.PHP
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
SQL injection vulnerability in Cacti 0.8.6i and earlier, when register_argc_argv is enabled, allows remote attackers to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php. NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
id | EDB-ID:3029 |
Nessus
NASL family CGI abuses NASL id CACTI_CMD_PHP_CMD_EXEC.NASL description The remote host is running Cacti, a web-based, front end to RRDTool for network graphing. The version of Cacti on the remote host does not properly check to ensure that the last seen 2020-06-01 modified 2020-06-02 plugin id 23963 published 2007-01-02 reporter This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/23963 title Cacti cmd.php Multiple Parameter SQL Injection Arbitrary Command Execution NASL family SuSE Local Security Checks NASL id SUSE_CACTI-2447.NASL description A command injection in cmd.php in cacti was fixed, which might have allowed remote attackers to inject commands and so execute code. (CVE-2006-6799) last seen 2020-06-01 modified 2020-06-02 plugin id 27169 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27169 title openSUSE 10 Security Update : cacti (cacti-2447) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1250.NASL description It was discovered that cacti, a frontend to rrdtool, performs insufficient validation of data passed to the last seen 2020-06-01 modified 2020-06-02 plugin id 24247 published 2007-01-26 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/24247 title Debian DSA-1250-1 : cacti - missing input sanitising NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200701-23.NASL description The remote host is affected by the vulnerability described in GLSA-200701-23 (Cacti: Command execution and SQL injection) rgod discovered that the Cacti cmd.php and copy_cacti_user.php scripts do not properly control access to the command shell, and are remotely accessible by unauthenticated users. This allows SQL injection via cmd.php and copy_cacti_user.php URLs. Further, the results from the injected SQL query are not properly sanitized before being passed to a command shell. The vulnerabilities require that the last seen 2020-06-01 modified 2020-06-02 plugin id 24308 published 2007-02-09 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/24308 title GLSA-200701-23 : Cacti: Command execution and SQL injection NASL family SuSE Local Security Checks NASL id SUSE_SA_2007_007.NASL description The remote host is missing the patch for the advisory SUSE-SA:2007:007 (cacti). A command injection in cmd.php in cacti was fixed, which might have allowed remote attackers to inject commands and so execute code. This issue is tracked by the Mitre CVE ID CVE-2006-6799. last seen 2019-10-28 modified 2007-02-18 plugin id 24461 published 2007-02-18 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/24461 title SUSE-SA:2007:007: cacti
References
- http://secunia.com/advisories/23528
- http://secunia.com/advisories/23665
- http://secunia.com/advisories/23917
- http://secunia.com/advisories/23941
- http://security.gentoo.org/glsa/glsa-200701-23.xml
- http://securitytracker.com/id?1017451
- http://www.cacti.net/release_notes_0_8_6j.php
- http://www.debian.org/security/2007/dsa-1250
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:015
- http://www.novell.com/linux/security/advisories/2007_07_cacti.html
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.001.html
- http://www.securityfocus.com/archive/1/457290/100/0/threaded
- http://www.securityfocus.com/bid/21799
- http://www.vupen.com/english/advisories/2006/5193
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31177
- https://www.exploit-db.com/exploits/3029