Bug 609115 (BONSAI-2010-0105, CVE-2010-1645) - CVE-2010-1645 cacti: multiple command injection flaws (BONSAI-2010-0105)
Summary: CVE-2010-1645 cacti: multiple command injection flaws (BONSAI-2010-0105)
Keywords:
Status: CLOSED ERRATA
Alias: BONSAI-2010-0105, CVE-2010-1645
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
: 586064 (view as bug list)
Depends On: 541684
Blocks: 595289
TreeView+ depends on / blocked
 
Reported: 2010-06-29 13:12 UTC by Tomas Hoger
Modified: 2019-09-29 12:37 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-12-21 22:46:30 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0635 0 normal SHIPPED_LIVE Important: Red Hat High Performance Computing (HPC) Solution 5.5 2010-08-20 02:42:21 UTC

Description Tomas Hoger 2010-06-29 13:12:58 UTC
Multiple input sanitization flaws were discovered in cacti.  Authenticated cacti administrator could use these flaws to run shell commands with web server privileges.

Note: cacti administrator is always allowed to run commands as cacti user.

References:
http://www.bonsai-sec.com/en/research/vulnerabilities/cacti-os-command-injection-0105.php
http://www.cacti.net/release_notes_0_8_7f.php

Upstream commits:
http://svn.cacti.net/viewvc?view=rev&revision=5778
http://svn.cacti.net/viewvc?view=rev&revision=5782
http://svn.cacti.net/viewvc?view=rev&revision=5784

See also bug #595289 for some related discussion.

Comment 2 Tomas Hoger 2010-06-29 13:36:28 UTC
*** Bug 586064 has been marked as a duplicate of this bug. ***

Comment 3 errata-xmlrpc 2010-08-20 02:42:36 UTC
This issue has been addressed in following products:

  Red Hat HPC Solution for RHEL 5

Via RHSA-2010:0635 https://rhn.redhat.com/errata/RHSA-2010-0635.html


Note You need to log in before you can comment on or make changes to this bug.