158 lines
8.1 KiB
JSON
Raw Normal View History

2024-12-12 21:07:30 +00:00
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20238407",
"Version": "oval:org.altlinux.errata:def:20238407",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-8407: package `cacti` update to version 1.2.26-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-8407",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-8407",
"Source": "ALTPU"
},
{
"RefID": "CVE-2023-46490",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-46490",
"Source": "CVE"
},
{
"RefID": "CVE-2023-49084",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-49084",
"Source": "CVE"
},
{
"RefID": "CVE-2023-49085",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-49085",
"Source": "CVE"
},
{
"RefID": "CVE-2023-49086",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-49086",
"Source": "CVE"
},
{
"RefID": "CVE-2023-50250",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-50250",
"Source": "CVE"
},
{
"RefID": "CVE-2023-50569",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-50569",
"Source": "CVE"
},
{
"RefID": "CVE-2023-51448",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-51448",
"Source": "CVE"
}
],
"Description": "This update upgrades cacti to version 1.2.26-alt1. \nSecurity Fix(es):\n\n * CVE-2023-46490: SQL Injection vulnerability in Cacti v1.2.25 allows a remote attacker to obtain sensitive information via the form_actions() function in the managers.php function.\n\n * CVE-2023-49084: Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). While using the detected SQL Injection and insufficient processing of the include file path, it is possible to execute arbitrary code on the server. Exploitation of the vulnerability is possible for an authorized user. The vulnerable component is the `link.php`. Impact of the vulnerability execution of arbitrary code on the server. \n\n * CVE-2023-49085: Cacti provides an operational monitoring and fault management framework. In versions 1.2.25 and prior, it is possible to execute arbitrary SQL code through the `pollers.php` script. An authorized user may be able to execute arbitrary SQL code. The vulnerable component is the `pollers.php`. Impact of the vulnerability - arbitrary SQL code execution. As of time of publication, a patch does not appear to exist.\n\n * CVE-2023-49086: Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). A vulnerability in versions prior to 1.2.27 bypasses an earlier fix for CVE-2023-39360, therefore leading to a DOM XSS attack. Exploitation of the vulnerability is possible for an authorized user. The vulnerable component is the `graphs_new.php`. The impact of the vulnerability is execution of arbitrary JavaScript code in the attacked user's browser. This issue has been patched in version 1.2.27.\n\n\n * CVE-2023-50250: Cacti is an open source operational monitoring and fault management framework. A reflection cross-site scripting vulnerability was discovered in version 1.2.25. Attackers can exploit this vulnerability to perform actions on behalf of other users. The vulnerability is found in `templates_import.php.` When uploading an xml template file, if the XML file does not pass the check, the server will give a JavaScript pop-up prompt, which contains unfiltered xml template file name, resulting in XSS. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. As of time of publication, no patched versions are available.\n\n\n * CVE-2023-50569: Rejected reason: DO NOT USE THIS CVE RECORD. Consult IDs: CVE-2023-50250. Reason: This record is a reservation duplicate of CVE-2023-50250. Notes: All CVE users should reference CVE-2023-50250 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.\n\n * CVE-2023-51448: Cacti provides an operational monitoring and fault management framework. Version 1.2.25 has a Blind SQL Injection (SQLi) vulnerability within the SNMP Notification Receivers feature in the file `managers.php`. An authenticated attacker with the “Settings/Utilities” permission can send a crafted HTTP GET request to the endpoint `/cacti/managers.php` with an SQLi payload in the `selected_graphs_array` HTTP GET parameter. As of time of publication, no patched versions exist.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-12-31"
},
"Updated": {
"Date": "2023-12-31"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2023-46490",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-46490",
"Impact": "Low",
"Public": "20231027"
},
{
"ID": "CVE-2023-49084",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-49084",
"Impact": "High",
"Public": "20231221"
},
{
"ID": "CVE-2023-49085",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-49085",
"Impact": "High",
"Public": "20231222"
},
{
"ID": "CVE-2023-49086",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-49086",
"Impact": "Low",
"Public": "20231222"
},
{
"ID": "CVE-2023-50250",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-50250",
"Impact": "Low",
"Public": "20231222"
},
{
"ID": "CVE-2023-50569",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-50569",
"Impact": "None",
"Public": "20231222"
},
{
"ID": "CVE-2023-51448",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-51448",
"Impact": "High",
"Public": "20231222"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20238407001",
"Comment": "cacti is earlier than 0:1.2.26-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20238407002",
"Comment": "cacti-setup is earlier than 0:1.2.26-alt1"
}
]
}
]
}
}
]
}