8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.4 High
AI Score
Confidence
High
5.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:P/A:P
0.106 Low
EPSS
Percentile
95.0%
Cacti is prone to multiple vulnerabilities.
# SPDX-FileCopyrightText: 2019 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:cacti:cacti";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.143254");
script_version("2024-02-15T05:05:40+0000");
script_tag(name:"last_modification", value:"2024-02-15 05:05:40 +0000 (Thu, 15 Feb 2024)");
script_tag(name:"creation_date", value:"2019-12-16 07:09:04 +0000 (Mon, 16 Dec 2019)");
script_tag(name:"cvss_base", value:"5.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:N/I:P/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-08-24 17:37:00 +0000 (Mon, 24 Aug 2020)");
script_cve_id("CVE-2019-17358", "CVE-2019-17357");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"VendorFix");
script_name("Cacti < 1.2.8 Multiple Vulnerabilities - Windows");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2019 Greenbone AG");
script_family("Web application abuses");
script_dependencies("gb_cacti_http_detect.nasl", "os_detection.nasl");
script_mandatory_keys("cacti/detected", "Host/runs_windows");
script_tag(name:"summary", value:"Cacti is prone to multiple vulnerabilities.");
script_tag(name:"insight", value:"The following vulnerabilities exist:
- There are multiple instances of lib/functions.php unsafe
deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to
influence object data values and control actions taken by Cacti or potentially cause memory corruption in the
PHP module.
- There is an SQL injection vulnerability via graphs.php?template_id affecting how template identifiers
are handled when a string and id composite value are used to identify the template type and id.
An authenticated attacker can exploit this to extract data from the database, or an unauthenticated
attacker could exploit this via Cross-Site Request Forgery.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"affected", value:"Cacti version 1.2.7 and prior.");
script_tag(name:"solution", value:"Update to version 1.2.8 or later.");
script_xref(name:"URL", value:"https://github.com/Cacti/cacti/issues/3025");
script_xref(name:"URL", value:"https://github.com/Cacti/cacti/issues/3026");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (!port = get_app_port(cpe: CPE))
exit(0);
if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
exit(0);
version = infos["version"];
location = infos["location"];
if (version_is_less(version: version, test_version: "1.2.8")) {
report = report_fixed_ver(installed_version: version, fixed_version: "1.2.8", install_path: location);
security_message(port: port, data: report);
exit(0);
}
exit(99);
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.4 High
AI Score
Confidence
High
5.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:P/A:P
0.106 Low
EPSS
Percentile
95.0%