Jump to content
Sign in to follow this  
paul

Advisories MDVSA-2010:160: cacti

Recommended Posts

Multiple vulnerabilities has been found and corrected in cacti:

 

Multiple cross-site scripting (XSS) vulnerabilities in Cacti before

0.8.7f, allow remote attackers to inject arbitrary web script or

HTML via the (1) hostname or (2) description parameter to host.php,

or (3) the host_id parameter to data_sources.php (CVE-2010-1644).

 

Cacti before 0.8.7f, allows remote authenticated administrators to

execute arbitrary commands via shell metacharacters in (1) the FQDN

field of a Device or (2) the Vertical Label field of a Graph Template

(CVE-2010-1645).

 

Cross-site scripting (XSS) vulnerability in

include/top_graph_header.php in Cacti before 0.8.7g allows remote

attackers to inject arbitrary web script or HTML via the graph_start

parameter to graph.php. NOTE: this vulnerability exists because of

an incorrect fix for CVE-2009-4032.2.b (CVE-2010-2543).

 

Cross-site scripting (XSS) vulnerability in utilities.php in Cacti

before 0.8.7g, allows remote attackers to inject arbitrary web script

or HTML via the filter parameter (CVE-2010-2544).

 

Multiple cross-site scripting (XSS) vulnerabilities in Cacti before

0.8.7g, allow remote attackers to inject arbitrary web script or HTML

via (1) the name element in an XML template to templates_import.php;

and allow remote authenticated administrators to inject arbitrary web

script or HTML via vectors related to (2) cdef.php, (3) data_input.php,

(4) data_queries.php, (5) data_sources.php, (6) data_templates.php, (7)

gprint_presets.php, (8) graph.php, (9) graphs_new.php, (10) graphs.php,

(11) graph_templates_inputs.php, (12) graph_templates_items.php,

(13) graph_templates.php, (14) graph_view.php, (15) host.php, (16)

host_templates.php, (17) lib/functions.php, (18) lib/html_form.php,

(19) lib/html_form_template.php, (20) lib/html.php, (21)

lib/html_tree.php, (22) lib/rrd.php, (23) rra.php, (24) tree.php,

and (25) user_admin.php (CVE-2010-2545).

 

This update provides cacti 0.8.7f, which is not vulnerable to these

issues.

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.
Sign in to follow this  

×
×
  • Create New...