Svi
Pretraži prema proizvođaču
Pretraži prema CWE oznaci
O usluzi
Pretplate
Jezik
hr
en
CVE-2019-16723 - CERT CVE
CVE-2019-16723
ID
CVE-2019-16723
Sažetak
In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter.
Reference
https://github.com/Cacti/cacti/issues/2964
https://www.debian.org/security/2020/dsa-4604
https://seclists.org/bugtraq/2020/Jan/25
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html
https://security.gentoo.org/glsa/202003-40
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSCUUCKSYVZLN3PQE7NU76AFWUGT3E2D/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZO3ROHHPKLH2JRW7ES5FYSQTWIPNVLQB/
CVSS
Base:
4.0
Impact:
2.9
Exploitability:
8.0
Pristup
Vektor
Složenost
Autentikacija
NETWORK
LOW
SINGLE
Impact
Povjerljivost
Cjelovitost
Dostupnost
PARTIAL
NONE
NONE
CVSS vektor
AV:N/AC:L/Au:S/C:P/I:N/A:N
Zadnje važnije ažuriranje
07-11-2023 - 03:05
Objavljeno
23-09-2019 - 15:15