Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <96642b6e35f857b3b0b4afb1dc23e525.squirrel@wm.kinkhorst.nl>
Date: Fri, 23 Apr 2010 15:35:25 +0200
From: "Thijs Kinkhorst" <thijs@...ian.org>
To: oss-security@...ts.openwall.com
Subject: CVE Request: cacti SQL injection in template_export

Hi,

On Wednesday an SQL injection issue was announced on Full Disclosure by
"Bonsai Information Security":
http://seclists.org/fulldisclosure/2010/Apr/272, quoting:
> A Vulnerability has been discovered in Cacti, which can be exploited by
> any user to conduct SQL Injection attacks. Input passed via the
> “export_item_id” parameter to “templates_export.php” script is not
> properly sanitized before being used in a SQL query.

Upstream has issued a patch for this issue:
http://www.cacti.net/downloads/patches/0.8.7e/sql_injection_template_export.patch
(but no new release yet)


thanks,
Thijs

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.