Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 159279 - net-analyzer/cacti Cacti "cmd.php" Command Execution and SQL Injection ?
Summary: net-analyzer/cacti Cacti "cmd.php" Command Execution and SQL Injection ?
Status: RESOLVED DUPLICATE of bug 159278
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/23528/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-12-28 06:40 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2006-12-28 06:43 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-12-28 06:40:51 UTC
Description:
rgod has discovered three vulnerabilities in Cacti, which can be exploited by malicious people to bypass certain security restrictions, manipulate data and compromise vulnerable systems.
 
 1) The cmd.php script does not properly restrict access to command line usage and is installed in a web-accessible location.
 
 Successful exploitation requires that "register_argc_argv" is enabled.
 
 2) Input passed in the URL to cmd.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
 
 Successful exploitation requires that "register_argc_argv" is enabled.
 
 3) The results from the SQL queries in 2) in cmd.php are not properly sanitised before being used as shell commands. This can be exploited to inject arbitrary shell commands.
 
 The vulnerabilities are confirmed in version 0.8.6i. Other versions may also be affected.

Solution:
Move the "cmd.php" script to a not web-accessible path, and update other scripts accordingly.
 
 Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
rgod
Comment 1 Jakub Moc (RETIRED) gentoo-dev 2006-12-28 06:43:38 UTC

*** This bug has been marked as a duplicate of 159278 ***