Vigil@nce - Cacti: three vulnerabilities
August 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Cacti.
Impacted products: Cacti, Debian.
Severity: 2/4.
Creation date: 12/06/2015.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Cacti.
An attacker can use a SQL injection, in order to read or alter
data. [severity:2/4; JPCERT#98968540, JVN#78187936]
An attacker can trigger a Cross Site Scripting, in order to
execute JavaScript code in the context of the web site.
[severity:2/4; CVE-2015-2665, CVE-2015-2967, FG-VD-15-017]
An attacker can use a SQL injection in Graph Templates, in order
to read or alter data. [severity:2/4; CVE-2015-4454]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Cacti-three-vulnerabilities-17114