[Pkg-cacti-maint] Bug#1079353: bookworm-pu: package cacti/1.2.24+ds1-1+deb12u3
Bastien Roucariès
rouca at debian.org
Thu Aug 22 16:38:54 BST 2024
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: cacti at packages.debian.org
Control: affects -1 + src:cacti
User: release.debian.org at packages.debian.org
Usertags: pu
[ Reason ]
Security upload. Except CVE-2024-27082 that need
coordination with other packages.
[ Impact ]
CVEs are not closed including RCE
[ Tests ]
Automated test and manual test of the application by myself and others, including users.
[ Risks ]
Low
[ Checklist ]
[X] *all* changes are documented in the d/changelog
[X] I reviewed all changes and I approve them
[X] attach debdiff against the package in (old)stable
[X] the issue is verified as fixed in unstable
[ Changes ]
* Fix CVE-2024-25641: RCE vulnerability when importing packages
An arbitrary file write vulnerability, exploitable through the
"Package Import" feature, allows authenticated users having
the "Import Templates" permission to execute arbitrary PHP
code on the web server (RCE).
* Fix CVE-2024-29894: XSS vulnerability when using JavaScript
based messaging API.
raise_message_javascript from lib/functions.php now uses purify.js
to fix CVE-2023-50250 (among others).
However it still generates the code out of unescaped
PHP variables $title and $header.
If those variables contain single quotes, they can be used
to inject JavaScript code.
* Fix CVE-2024-31443. XSS vulnerability when managing data queries
Some of the data stored in form_save() function in data_queries.php
is not thoroughly checked and is used to concatenate the
HTML statement in grow_right_pane_tree() function from lib/html.php,
finally resulting in XSS.
* Fix CVE-2024-31444: XSS vulnerability when reading tree rules with
Automation API.
Some of the data stored in automation_tree_rules_form_save() function
in automation_tree_rules.php is not thoroughly checked and is used
to concatenate the HTML statement in form_confirm() function from
lib/html.php , finally resulting in XSS.
* Fix CVE-2024-31445: SQL injection vulnerability
A SQL injection vulnerability in `automation_get_new_graphs_sql`
function of `api_automation.php` allows authenticated users to exploit
these SQL injection vulnerabilities to perform privilege escalation
and remote code execution. In `api_automation.php` line 856, the
`get_request_var('filter')` is being concatenated into the SQL
statement without any sanitization. In `api_automation.php` line 717,
The filter of `'filter'` is `FILTER_DEFAULT`, which means there is no
filter for it
* Fix CVE-2024-31458: SQL injection vulnerability
Some of the data stored in `form_save()` function in
`graph_template_inputs.php` is not thoroughly checked and is used to
concatenate the SQL statement in
`draw_nontemplated_fields_graph_item()` function from
`lib/html_form_templates.php` , finally resulting in SQL injection
* Fix CVE-2024-31459: Remote code execution
There is a file inclusion issue in the lib/plugin.php file.
Combined with SQL injection vulnerabilities, RCE can be implemented.
* Fix CVE-2024-31460: SQL code injection
Some of the data stored in `automation_tree_rules.php` is not
thoroughly checked and is used to concatenate the SQL statement in
`create_all_header_nodes()` function from `lib/api_automation.php` ,
finally resulting in SQL injection. Using SQL based secondary
injection technology, attackers can modify the contents of the Cacti
database, and based on the modified content, it may be possible to
achieve further impact, such as arbitrary file reading, and even
remote code execution through arbitrary file writing
* Fix CVE-2024-34340: type juggling vulnerability
Cacti calls `compat_password_hash` when users set their
password. `compat_password_hash` use `password_hash` if there is it,
else use `md5`. When verifying password, it calls
`compat_password_verify`. In `compat_password_verify`,
`password_verify` is called if there is it, else use
`md5`. `password_verify` and `password_hash` are supported on PHP <
5.5.0, following PHP manual. The vulnerability is in
`compat_password_verify`. Md5-hashed user input is compared with
correct password in database by `$md5 == $hash`. It is a loose
comparison, not `===`.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: This is a digitally signed message part.
URL: <http://alioth-lists.debian.net/pipermail/pkg-cacti-maint/attachments/20240822/36b8f493/attachment.sig>
More information about the Pkg-cacti-maint
mailing list