ArchLinux: 201712-2: cacti: multiple issues
Summary
- CVE-2017-16641 (arbitrary command execution)
lib/rrd.php in Cacti 1.1.27 allows remote authenticated administratorsto execute arbitrary OS commands via the path_rrdtool parameter in an
action=save request to settings.php.
- CVE-2017-16660 (arbitrary code execution)
Cacti 1.1.27 allows remote authenticated administrators to conduct
Remote Code Execution attacks by placing the Log Path under the web
root, and then making a remote_agent.php request containing PHP code in
a Client-ip header.
- CVE-2017-16661 (arbitrary filesystem access)
Cacti 1.1.27 allows remote authenticated administrators to read
arbitrary files by placing the Log Path into a private directory, and
then making a clog.php?filename= request, as demonstrated by
filename=passwd (with a Log Path under /etc) to read /etc/passwd.
- CVE-2017-16785 (cross-site scripting)
Cacti 1.1.27 has reflected XSS via the PATH_INFO to host.php.
Resolution
Upgrade to 1.1.28-1.
# pacman -Syu "cacti>=1.1.28-1"
The problems have been fixed upstream in version 1.1.28.
References
https://github.com/Cacti/cacti/commit/e8088bb6593e6a49d000c342d17402f01db8740e https://github.com/Cacti/cacti/issues/1066 https://github.com/Cacti/cacti/commit/4e74f46fe24bed533fcfc8c8a43121ed59ce2002 https://github.com/Cacti/cacti/commit/a179e8092dbff7406e39ca16c2823f4fe530f5e0 https://github.com/Cacti/cacti/commit/c0f0ce27f0c281d7e1e57f91891c5ca9a92df013 https://github.com/Cacti/cacti/commit/96d793f33ebf16c0b12e1ec779d7debb87990cdd https://github.com/Cacti/cacti/issues/1071 https://security.archlinux.org/CVE-2017-16641 https://security.archlinux.org/CVE-2017-16660 https://security.archlinux.org/CVE-2017-16661 https://security.archlinux.org/CVE-2017-16785
Workaround
None.