Synopsis
The remote web server contains a PHP script that is affected by a SQL injection issue.
Description
The remote host is running Cacti, a web-based, front end to RRDTool for network graphing.
The version of Cacti on the remote host does not properly check whether the 'copy_cacti_user.php' script is being run from a commandline and fails to sanitize user-supplied input before using it in database queries. Provided PHP's 'register_argc_argv' parameter is enabled, which is the default, an attacker can leverage this issue to launch SQL injection attacks against the underlying database and, for example, add arbitrary administrative users.
Solution
Unknown at this time.
Plugin Details
File Name: cacti_copy_cacti_user_sql_injection.nasl
Configuration: Enable thorough checks
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/a:the_cacti_group:cacti
Required KB Items: www/cacti
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: Exploits are available
Reference Information
BID: 21823