From 068860a5e5a0451049074ced1364522115ea6bc4 Mon Sep 17 00:00:00 2001 From: Jochen Neumeister Date: Mon, 27 Jul 2020 08:48:46 +0000 Subject: [PATCH] Add entry for Cacti PR: 248140 Sponsored by: Netzkommune GmbH --- security/vuxml/vuln.xml | 38 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 5201793a3ecd..a38339113096 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,44 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + Cacti -- multiple vulnerabilities + + + cacti + 1.2.13 + + + + +

Cacti developers reports:

+
+

Multiple fixes for bundled jQuery to prevent + code exec (CVE-2020-11022, CVE-2020-11023).

+

PHPMail contains a escaping bug + (CVE-2020-13625).

+

SQL Injection via color.php in Cacti + (CVE-2020-14295).

+
+ +
+ + https://www.cacti.net/release_notes.php?version=1.2.13 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13625 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14295 + CVE-2020-11022 + CVE-2020-11023 + CVE-2020-13625 + CVE-2020-14295 + + + 2020-07-15 + 2020-07-27 + +
+ Wagtail -- XSS vulnerability