Short Name |
HTTP:PHP:CACTI-RRD-AUTH-BYPASS |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
Cacti RRD Authentication Bypass |
Release Date |
2005/07/27 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against Cacti Round Robin Database (RRD) Tool. A successful exploitation can allow an attacker to gain privilege escalation through the Web application interface.
A design error affecting RaXnet Cacti can allow an attacker to prevent the 'session_start()' and 'addslashes()' functions from being called. The affected 'session_start()' and 'addslashes()' calls are nested inside an 'if' control statement that depends on an attacker-controlled value. Reports indicate that this value may be controlled through a URI parameter when 'register_globals' is set. A remote attacker may exploit these issues to gain administrative access to the affected software.