HTTP: Cacti RRD Authentication Bypass
This signature detects attempts to exploit a known vulnerability against Cacti Round Robin Database (RRD) Tool. A successful exploitation can allow an attacker to gain privilege escalation through the Web application interface.
Extended Description
A design error affecting RaXnet Cacti can allow an attacker to prevent the 'session_start()' and 'addslashes()' functions from being called. The affected 'session_start()' and 'addslashes()' calls are nested inside an 'if' control statement that depends on an attacker-controlled value. Reports indicate that this value may be controlled through a URI parameter when 'register_globals' is set. A remote attacker may exploit these issues to gain administrative access to the affected software.
Affected Products
Conectiva linux
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Raxnet
Conectiva
10.0