Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 482424 (CVE-2013-5588) - <net-analyzer/cacti-0.8.8b-r2: SQL and XSS vulnerabilities (CVE-2013-{5588,5589})
Summary: <net-analyzer/cacti-0.8.8b-r2: SQL and XSS vulnerabilities (CVE-2013-{5588,55...
Status: RESOLVED FIXED
Alias: CVE-2013-5588
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks: CVE-2013-1434
  Show dependency tree
 
Reported: 2013-08-25 14:20 UTC by Chris Reffett (RETIRED)
Modified: 2013-12-31 06:05 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Chris Reffett (RETIRED) gentoo-dev Security 2013-08-25 14:20:58 UTC
From $(URL):

Three cross-site scripting vulnerabilities were reported in the Cacti
Bugtracker at [1]:

 - Reflected XSS in the "step" parameter of the "/install/index.php"
   script
 - Stored XSS in the id parameter in the "/cacti/host.php" script
 - "/cacti/host.php" script is vulnerable to Blind SQL Injection in
   the "id" parameter.

Upstream (Cc'ed) has commited r7420[2] and r7421[3]
for 0.8.8 and 0.8.9 respectively to fix these issues.

 [1] http://bugs.cacti.net/view.php?id=2383
 [2] http://svn.cacti.net/viewvc?view=rev&revision=7420
 [3] http://svn.cacti.net/viewvc?view=rev&revision=7421

Note that incorrect phrasing was used, one is an SQL injection, not an XSS. Patches are available at the above links.
Comment 1 Jorge Manuel B. S. Vicetto (RETIRED) Gentoo Infrastructure gentoo-dev 2013-08-27 02:22:25 UTC
I just added cacti-0.8.8b-r1 added to the tree with the patches.
Comment 2 Chris Reffett (RETIRED) gentoo-dev Security 2013-08-27 03:08:31 UTC
Sounds good. @netmon: do we need to stabilize anything besides cacti and cacti-spine, and are we good to stabilize those?
Comment 3 Reuben Farrelly 2013-08-27 06:05:49 UTC
Please consider the patch by gandalf (Developer) listed in this forum page:

http://forums.cacti.net/viewtopic.php?f=21&t=50645

Specifically: http://forums.cacti.net/download/file.php?id=28145

Without it, graph previews using COMMENT fields break after upgrade from 0.8.8a.  This patch really needs to go into the 0.8.8b ebuild to avoid a regression.
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2013-08-29 17:52:14 UTC
CVE-2013-5589 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5589):
  SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and earlier
  allows remote attackers to execute arbitrary SQL commands via the id
  parameter.

CVE-2013-5588 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5588):
  Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b and
  earlier allow remote attackers to inject arbitrary web script or HTML via
  (1) the step parameter to install/index.php or (2) the id parameter to
  cacti/host.php.
Comment 5 Jorge Manuel B. S. Vicetto (RETIRED) Gentoo Infrastructure gentoo-dev 2013-09-11 14:00:07 UTC
(In reply to Reuben Farrelly from comment #3)
> Please consider the patch by gandalf (Developer) listed in this forum page:
> 
> http://forums.cacti.net/viewtopic.php?f=21&t=50645
> 
> Specifically: http://forums.cacti.net/download/file.php?id=28145
> 
> Without it, graph previews using COMMENT fields break after upgrade from
> 0.8.8a.  This patch really needs to go into the 0.8.8b ebuild to avoid a
> regression.

I just confirmed the patch works. I had hit this regression, but didn't realize it was a regression.
cacti-0.8.8b-r2 is on the way to the tree.
Comment 6 Jorge Manuel B. S. Vicetto (RETIRED) Gentoo Infrastructure gentoo-dev 2013-09-11 15:12:20 UTC
(In reply to Jorge Manuel B. S. Vicetto from comment #5)
> (In reply to Reuben Farrelly from comment #3)
> > Please consider the patch by gandalf (Developer) listed in this forum page:
> > 
> > http://forums.cacti.net/viewtopic.php?f=21&t=50645
> > 
> > Specifically: http://forums.cacti.net/download/file.php?id=28145
> > 
> > Without it, graph previews using COMMENT fields break after upgrade from
> > 0.8.8a.  This patch really needs to go into the 0.8.8b ebuild to avoid a
> > regression.
> 
> I just confirmed the patch works. I had hit this regression, but didn't
> realize it was a regression.
> cacti-0.8.8b-r2 is on the way to the tree.

Done
Comment 7 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-11 15:17:45 UTC
Release the arch teams! Arches, please test and mark stable:
=net-analyzer/cacti-0.8.8b-r2
Target arches: alpha amd64 hppa sparc x86
Comment 8 Agostino Sarubbo gentoo-dev 2013-09-11 18:40:13 UTC
amd64 stable
Comment 9 Jeroen Roovers (RETIRED) gentoo-dev 2013-09-13 14:41:39 UTC
Stable for HPPA.
Comment 10 Agostino Sarubbo gentoo-dev 2013-09-14 10:14:29 UTC
x86 stable
Comment 11 Agostino Sarubbo gentoo-dev 2013-09-14 10:36:26 UTC
alpha stable
Comment 12 Agostino Sarubbo gentoo-dev 2013-09-14 10:40:09 UTC
sparc stable
Comment 13 Sean Amoss (RETIRED) gentoo-dev Security 2013-09-14 15:22:25 UTC
GLSA vote: no.

Maintainers, please drop vulnerable versions.
Comment 14 Sergey Popov gentoo-dev 2013-09-15 11:51:29 UTC
GLSA vote: no

Waiting for cleanup
Comment 15 Yury German Gentoo Infrastructure gentoo-dev 2013-12-30 06:24:02 UTC
Ping!

Maintainer(s), please drop the vulnerable version.
Comment 16 Jeroen Roovers (RETIRED) gentoo-dev 2013-12-30 11:39:16 UTC
--- ChangeLog   2013-09-15 16:15:48.848128397 +0200
+++ ChangeLog.new       2013-12-30 12:38:05.503941317 +0100
@@ -2,6 +2,10 @@
 # Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2
 # $Header: /var/cvsroot/gentoo-x86/net-analyzer/cacti/ChangeLog,v 1.198 2013/09/14 10:40:06 ago Exp $
 
+  30 Dec 2013; Jeroen Roovers <jer@gentoo.org> -cacti-0.8.7i.ebuild,
+  -cacti-0.8.8a.ebuild, -cacti-0.8.8b.ebuild, -cacti-0.8.8b-r1.ebuild:
+  Old.
+
Comment 17 Yury German Gentoo Infrastructure gentoo-dev 2013-12-31 06:05:47 UTC
Maintainer(s), Thank you for your work!

GLSA Voting complete = No 
Closing.