openSUSE Security Update: Security update for cacti, cacti-spine
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2020:1106-1
Rating:             moderate
References:         #1115436 #1154087 #1173090 
Cross-References:   CVE-2020-11022 CVE-2020-11023 CVE-2020-13625
                    CVE-2020-14295
Affected Products:
                    openSUSE Backports SLE-15-SP1
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:

   This update for cacti, cacti-spine fixes the following issues:

   - cacti 1.2.13:

     * Query XSS vulnerabilities require vendor package update
       (CVE-2020-11022 / CVE-2020-11023)
     * Lack of escaping on some pages can lead to XSS exposure
     * Update PHPMailer to 6.1.6 (CVE-2020-13625)
     * SQL Injection vulnerability due to input validation failure when
       editing colors (CVE-2020-14295, boo#1173090)
     * Lack of escaping on template import can lead to XSS exposure

   - switch from cron to systemd timers (boo#1115436):
     + cacti-cron.timer
     + cacti-cron.service
   - avoid potential root escalation on systems with fs.protected_hardlinks=0
     (boo#1154087): handle directory permissions in file section instead
     of using chown during post installation
   - rewrote apache configuration to get rid of .htaccess files and
     explicitely disable directory permissions per default (only allow a
     limited, well-known set of directories)


   This update was imported from the openSUSE:Leap:15.1:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP1:

      zypper in -t patch openSUSE-2020-1106=1



Package List:

   - openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):

      cacti-spine-1.2.13-bp151.4.12.1
      cacti-spine-debuginfo-1.2.13-bp151.4.12.1
      cacti-spine-debugsource-1.2.13-bp151.4.12.1

   - openSUSE Backports SLE-15-SP1 (noarch):

      cacti-1.2.13-bp151.4.12.1


References:

   https://www.suse.com/security/cve/CVE-2020-11022.html
   https://www.suse.com/security/cve/CVE-2020-11023.html
   https://www.suse.com/security/cve/CVE-2020-13625.html
   https://www.suse.com/security/cve/CVE-2020-14295.html
   https://bugzilla.suse.com/1115436
   https://bugzilla.suse.com/1154087
   https://bugzilla.suse.com/1173090

-- 

openSUSE: 2020:1106-1: moderate: cacti, cacti-spine

July 27, 2020
An update that fixes four vulnerabilities is now available.

Description

This update for cacti, cacti-spine fixes the following issues: - cacti 1.2.13: * Query XSS vulnerabilities require vendor package update (CVE-2020-11022 / CVE-2020-11023) * Lack of escaping on some pages can lead to XSS exposure * Update PHPMailer to 6.1.6 (CVE-2020-13625) * SQL Injection vulnerability due to input validation failure when editing colors (CVE-2020-14295, boo#1173090) * Lack of escaping on template import can lead to XSS exposure - switch from cron to systemd timers (boo#1115436): + cacti-cron.timer + cacti-cron.service - avoid potential root escalation on systems with fs.protected_hardlinks=0 (boo#1154087): handle directory permissions in file section instead of using chown during post installation - rewrote apache configuration to get rid of .htaccess files and explicitely disable directory permissions per default (only allow a limited, well-known set of directories) This update was imported from the openSUSE:Leap:15.1:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP1: zypper in -t patch openSUSE-2020-1106=1


Package List

- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64): cacti-spine-1.2.13-bp151.4.12.1 cacti-spine-debuginfo-1.2.13-bp151.4.12.1 cacti-spine-debugsource-1.2.13-bp151.4.12.1 - openSUSE Backports SLE-15-SP1 (noarch): cacti-1.2.13-bp151.4.12.1


References

https://www.suse.com/security/cve/CVE-2020-11022.html https://www.suse.com/security/cve/CVE-2020-11023.html https://www.suse.com/security/cve/CVE-2020-13625.html https://www.suse.com/security/cve/CVE-2020-14295.html https://bugzilla.suse.com/1115436 https://bugzilla.suse.com/1154087 https://bugzilla.suse.com/1173090--


Severity
Announcement ID: openSUSE-SU-2020:1106-1
Rating: moderate
Affected Products: openSUSE Backports SLE-15-SP1

Related News