cacti remote injection exploit
Bug #78453 reported by
Chris Weiss
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
cacti (Debian) |
Fix Released
|
Unknown
|
|||
cacti (Ubuntu) |
Fix Released
|
High
|
Unassigned | ||
Breezy |
Invalid
|
High
|
Unassigned | ||
Dapper |
Fix Released
|
High
|
Unassigned | ||
Edgy |
Fix Released
|
High
|
Kees Cook |
Bug Description
Binary package hint: cacti
exploit is described in this thread http://
Dapper is vulnerable to this on a default install of apache2 php5 and cacti
upstream claims to be patched.
CVE References
Changed in cacti: | |
status: | Unknown → Confirmed |
Changed in cacti: | |
status: | Confirmed → Fix Committed |
Changed in cacti: | |
importance: | Undecided → High |
status: | Unconfirmed → Confirmed |
importance: | Undecided → High |
status: | Unconfirmed → Confirmed |
importance: | Undecided → High |
status: | Unconfirmed → Confirmed |
Changed in cacti: | |
status: | Fix Committed → Fix Released |
Changed in cacti: | |
assignee: | nobody → pirast |
assignee: | nobody → pirast |
Changed in cacti: | |
status: | Confirmed → In Progress |
status: | Confirmed → In Progress |
Changed in cacti: | |
assignee: | pirast → nobody |
status: | In Progress → Confirmed |
assignee: | pirast → nobody |
Changed in cacti: | |
status: | Fix Committed → Fix Released |
To post a comment you must log in.
This is quite easy to work around. Add the following lines to /etc/cacti/ apache. conf:
<Files cmd.php>
Deny from All
Deny from All
</Files>
<Files poller.php>
</Files>
These script shouldn't be reachable through the webserver anyways.