DescriptionSQL injection vulnerability in graph_templates_inputs.php in Cacti 0.8.8b allows remote attackers to execute arbitrary SQL commands via the graph_template_input_id and graph_template_id parameters.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cacti (PTS)stretch (security), stretch0.8.8h+ds1-10+deb9u1fixed
buster (security)1.2.2+ds1-2+deb10u2fixed
bullseye, sid1.2.16+ds1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[jessie] - cacti <ignored> (Minor issue, can be mitigated with Web Application Firewalls)
[wheezy] - cacti <ignored> (Minor issue, can be mitigated with Web Application Firewalls)
MITRE disagrees that this CVE is a duplicate of CVE-2014-4002 and CVE-2016-3172.
MITRE believes that CVE-2017-1000031 is a different vulnerability than
CVE-2014-4002 and CVE-2016-3172. This is because they seprate on vulnerability
type, so it cannot be a duplicate of CVE-2014-4002 despite sharing attack
vectors with this vulnerability, and covers different attack vectors than
CVE-2016-3172 despite sharing vulnerability type, and appears to be
independently fixable from said vulnerability based on the fix provided here:
According to
the first issue was fixed by
whereas the second issue was fixed by
After the request to MITRE to reject this CVE, elbrus discovered that also
CVE-2015-4634 seems part of the duplication. Upstream commit 4e4dd67 was in the
preperation git tree for 1.x, its equivalent svn commit was used to fix
CVE-2015-4634 in Debian.

Search for package or bug name: Reporting problems