Threat Encyclopedia



This indicates an attack attempt to exploit an SQL Injection Vulnerability in Cacti Group Cacti.
The vulnerability is due to improper validation of user supplied input in requests to graphs.php. A remote, authenticated attacker can exploit this vulnerability by sending an HTTP request with crafted HTTP parameters to the target server. Successful exploitation could result in the execution of arbitrary SQL commands against the database on the target server.

Affected Products

Cacti Group Cacti 1.2.7 and prior


System Compromise: Remote attackers can add, view, delete or modify data in the database of the affected application

Recommended Actions

Apply the most recent upgrade or patch from the vendor.

CVE References