CVE-2014-2327
 
Severity Score
6.8
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Cross-site request forgery (CSRF) vulnerability in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to hijack the authentication of users for unspecified commands, as demonstrated by requests that (1) modify binary files, (2) modify configurations, or (3) add arbitrary users.
Vulnerabilidad de CSRF en Cacti 0.8.7g, 0.8.8b y anteriores permite a atacantes remotos secuestrar la autenticaciĆ³n de usuarios para comandos no especificados, tal y como fue demostrado por solicitudes que (1)modifican archivos binarios, (2) modifican configuraciones o (3) aƱaden usuarios arbitrarios.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2014-03-12 CVE Reserved
- 2014-03-25 CVE Published
- 2023-12-04 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://jvn.jp/en/jp/JVN55076671/index.html | Third Party Advisory | |
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-002239.html | Third Party Advisory | |
http://secunia.com/advisories/59203 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/531588 | Mailing List | |
http://www.securityfocus.com/bid/66392 | Third Party Advisory | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2015-03/msg00034.html | 2018-12-13 | |
http://www.debian.org/security/2014/dsa-2970 | 2018-12-13 | |
https://security.gentoo.org/glsa/201509-03 | 2018-12-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cacti Search vendor "Cacti" | Cacti Search vendor "Cacti" for product "Cacti" | >= 0.8.7 <= 0.8.7g Search vendor "Cacti" for product "Cacti" and version " >= 0.8.7 <= 0.8.7g" | - |
Affected
| ||||||
Cacti Search vendor "Cacti" | Cacti Search vendor "Cacti" for product "Cacti" | >= 0.8.8 <= 0.8.8b Search vendor "Cacti" for product "Cacti" and version " >= 0.8.8 <= 0.8.8b" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 13.1 Search vendor "Opensuse" for product "Opensuse" and version "13.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 13.2 Search vendor "Opensuse" for product "Opensuse" and version "13.2" | - |
Affected
|