|
Message-ID: <5202817D.9030302@redhat.com> Date: Wed, 07 Aug 2013 11:18:53 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Vincent Danen <vdanen@...hat.com> Subject: Re: CVE request: SQL injection and shell escaping issues in Cacti < 0.8.8b -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/07/2013 10:06 AM, Vincent Danen wrote: > Cacti 0.8.8b was released today [1] with a changelog that notes: > > Cacti 0.8.8b Change Log [...] * security: SQL injection and shell > escaping issues > > It looks like the SQL injection issue is in api_poller.php and > utility.php [2] > > I think there are two shell escaping issue: > > 1) snmp.php: Use escapeshellarg() instead of custom escape function > for snmp library [3] 2) rrd.php: Properly escape all user input for > consumption by rrdtool [4] > > > [1] http://sourceforge.net/mailarchive/message.php?msg_id=31258868 > [2] http://svn.cacti.net/viewvc?view=rev&revision=7394 [3] > http://svn.cacti.net/viewvc?view=rev&revision=7392 [4] > http://svn.cacti.net/viewvc?view=rev&revision=7393 > > > Looks like 3 CVEs are needed. > JUST FYI vdanen/myself were emailed off list about some CVE's that may have already been assigned to this. Just waiting on that info before proceeding. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJSAoF9AAoJEBYNRVNeJnmTvU0P/RKdK6I0+K5lKJSuhfaoZByH E+1JaQh+9DQFWAjIBJropw46eaJ9snB72dCtj+LDr4J1stBPIkZDGVnBNB3feIlH rJMBBuqQAGU3DdpQz4I3txRt/wDHB540PglKdOFYDXTiKWvy8y0HodrQmkzIU+Xd HLJA8GDHNB/YGXreKDTEQO/KntHKc0YvAY5JeX1EvNJNwDdcHs444lEbKMmoGmpx iS8Khy5EEftwmPVJYzPDXGvdzX6UjdxTEOJHhysUM7m7aGhLtcBoaziC7k9wMcf2 ghCzSzEqcqGkN4cShz0u00naZ627df7i6SZAuM7xp7vvNr9SnunhMMemjt317q9K Vr9Gu3Lb7SwnzRugK8/GMwvgXnzKHyISaoYJX+4EZ7c9J/3x7ZtMdGCfOAmx4x/9 O90YO5tK6szJzsFeBg/yCPAiJ0gt7o6m67jzGOxw6wNPEW4rc0L80o/vjbmhgyop e6CQLlOiTFhlP1iUBXtioyOFIQlwjqIivzcvn23sNW0G7lWmHZ0f9hNq5O03Woq6 80sGJYRnJzptoFM2TOf7YwqzN17bzURO0FQsMTGlyyWt3MU03s4gIRnFmmdvvmjh ce85EAcWiRwmbRPuVHJ0TXPRbBdA0PdcPzvqgCcgs11kEgIbIVdk4ODaWcMqzxSV dhfcoUXmv9uZNEVOz/+4 =b6WC -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.