Tuesday, April 2, 2024

[USN-6720-1] Cacti vulnerability

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEE5rkwSLC9ntq84w397Dtram9gyMMFAmYMGtUFAwAAAAAACgkQ7Dtram9gyMPm
hAf+KRO5fEvcPbCZ0FoLAyNS5bmxOGty6YF0iYWGsOcVo9H2VS7yphR2LG/0QQXHVcrGlYILMZo5
/dfSUBrWFYYSFimoSNJlubuSRhpayly3x3KoMCUKZjT1O6zJLAhvLEPB7avXQQVLWNpBlmX3jTi2
ynNcbd2+d6j4DU7rSphzYEHPcxKZ8EGxncWWqx0QibqihAG9RTFbiIPjeHB3FFUDQ2pQjxRdWF0G
4VV88T6NOp+vKZQL/KOJTe7lx6O2AWRLzZfL08E5Ks/ljASr0tJXOQZp4m1PkRmvIKUGv+lM7SJs
d5MFOrgMr3JKFnMmEHQyqLX1Yeu4QxlH6+/4IIoSEQ==
=q9c5
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6720-1
April 02, 2024

cacti vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS (Available with Ubuntu Pro)

Summary:

Cacti could be made to crash if it received specially crafted
input.

Software Description:
- cacti: web interface for graphing of monitoring systems

Details:

Kentaro Kawane discovered that Cacti incorrectly handled user provided
input sent through request parameters to the graph_view.php script.
A remote authenticated attacker could use this issue to perform
SQL injection attacks.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS (Available with Ubuntu Pro):
cacti 1.2.19+ds1-2ubuntu1+esm1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6720-1
CVE-2023-39361

No comments:

Post a Comment