Cacti fails to properly sanitize input which can lead to SQL injection, authentication bypass as well as PHP file inclusion.
Impact
An attacker could potentially exploit the file inclusion to execute arbitrary code with the permissions of the web server. An attacker could exploit these vulnerabilities to bypass authentication or inject SQL queries to gain information from the database. Only systems with register_globals set to "On" are affected by the file inclusion and authentication bypass vulnerabilities. Gentoo Linux ships with register_globals set to "Off" by default.
Workaround
There is no known workaround at this time.
Resolution
All Cacti users should upgrade to the latest version:
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum