CVE-2017-1000031

NameCVE-2017-1000031
DescriptionSQL injection vulnerability in graph_templates_inputs.php in Cacti 0.8.8b allows remote attackers to execute arbitrary SQL commands via the graph_template_input_id and graph_template_id parameters.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cacti (PTS)stretch (security), stretch0.8.8h+ds1-10+deb9u1fixed
buster1.2.2+ds1-2+deb10u4fixed
buster (security)1.2.2+ds1-2+deb10u2fixed
bullseye, sid1.2.16+ds1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cactisource(unstable)0.8.8e+ds1-1

Notes

[jessie] - cacti <ignored> (Minor issue, can be mitigated with Web Application Firewalls)
[wheezy] - cacti <ignored> (Minor issue, can be mitigated with Web Application Firewalls)
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-007/?fid=7789
MITRE disagrees that this CVE is a duplicate of CVE-2014-4002 and CVE-2016-3172.
MITRE believes that CVE-2017-1000031 is a different vulnerability than
CVE-2014-4002 and CVE-2016-3172. This is because they seprate on vulnerability
type, so it cannot be a duplicate of CVE-2014-4002 despite sharing attack
vectors with this vulnerability, and covers different attack vectors than
CVE-2016-3172 despite sharing vulnerability type, and appears to be
independently fixable from said vulnerability based on the fix provided here:
https://github.com/Cacti/cacti/issues/866
According to https://github.com/Cacti/cacti/issues/866#issuecomment-316865448
the first issue was fixed by https://github.com/Cacti/cacti/commit/be800c9e552d2929106b576922e9693c83b4bd46
whereas the second issue was fixed by https://github.com/Cacti/cacti/commit/4e4dd6784adfc07b6011da999809d86a06f0f4e5
After the request to MITRE to reject this CVE, elbrus discovered that also
CVE-2015-4634 seems part of the duplication. Upstream commit 4e4dd67 was in the
preperation git tree for 1.x, its equivalent svn commit was used to fix
CVE-2015-4634 in Debian.

Search for package or bug name: Reporting problems