Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4C0D0B4A.1010306@cacti.net>
Date: Mon, 07 Jun 2010 11:07:54 -0400
From: Larry Adams <thewitness@...ti.net>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: Jan Lieskovsky <jlieskov@...hat.com>, 
 oss-security@...ts.openwall.com, Nahuel Grisolia <nahuel@...sai-sec.com>, 
 Stefan Esser <stefan.esser@...tioneins.de>,
 Cacti Developers <developers@...ti.net>, Tony Roman <roman@...order.com>
Subject: Re: CVE Request -- Cacti v0.8.7 -- three security
 fixes



On 6/7/2010 10:21 AM, Steven M. Christey wrote:
>
> On Tue, 1 Jun 2010, Jan Lieskovsky wrote:
>
>>> [C], SQL injection and shell escaping issues reported by Bonsai 
>>> Information Security (http://www.bonsai-sec.com)
>>>            [7] 
>>> http://www.bonsai-sec.com/blog/index.php/using-grep-to-find-0days/
>>>            [8] 
>>> http://www.bonsai-sec.com/en/research/vulnerabilities/cacti-os-command-injection-0105.php 
>>>
>>>
>>>
>>> ...
>>>
>
>>  2, OS command injection issue, CVE-2010-1645 / BONSAI-2010-0105
>>     References:  [2] 
>> http://www.bonsai-sec.com/en/research/vulnerabilities/cacti-os-command-injection-0105.php 
>>
>>     Proper patches are the following three: (noticed by Tomas Hoger 
>> && confirmed by Tony Roman, thanks for it!)
>>       [3] http://svn.cacti.net/viewvc?view=rev&revision=5778
>>       [4] http://svn.cacti.net/viewvc?view=rev&revision=5782
>>       [5] http://svn.cacti.net/viewvc?view=rev&revision=5784
>
> The BONSAI-2010-0105 references two problems, one for ping.php and 
> another one having to do with a "Vertical Label" in a "Graph Template."
>
> I don't see evidence of this vector in the revisions listed above.  
> Does anybody else?
>
> (If the "Vertical Label" issue went unpatched, then a separate CVE 
> should probably be assigned to it.)
>
> - Steve

Steve,

I just validated that the Vertical Label via the hostname field 
injection is not resolved from a UI perspective in host.php.  I have not 
checked lib/rrd.php for proper escaping and will do that shortly.

Generally, we're not as concerned when it comes to components of the UI 
that are not accessible for the guest account.  However, I will close 
this loophole today and prior to Cacti 0.8.7g beta.  Simply put, we 
should not permit any name there that is not either an IP address or 
something that is conforming (aka hostname or fqdn).

I toyed with the idea of a gethostbyname validation.  However, there are 
cases in Cacti where we have hosts that are represented more as Objects 
and not as physical hosts (aka no avail check), so it will have to be a 
hostname that is syntactically correct.  I'll get you a commit # once 
it's in.

Regards,

Larry Adams
Lead Cacti Developer

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.