Bug 891916 (CVE-2014-5261) - VUL-0: CVE-2014-5261, CVE-2014-5262: cacti: remote code execution and SQL injection
Summary: VUL-0: CVE-2014-5261, CVE-2014-5262: cacti: remote code execution and SQL inj...
Status: RESOLVED FIXED
Alias: CVE-2014-5261
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other openSUSE 13.1
: P3 - Medium : Major
Target Milestone: ---
Assignee: Peter Nixon
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-08-14 09:32 UTC by Alexander Bergmann
Modified: 2015-06-11 09:51 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2014-08-14 09:32:22 UTC
Via oss-security:

Date: Tue, 12 Aug 2014 23:07:21 +0200
From: Nico Golde <oss-security+ml@...lde.de>
Subject: CVE id request: cacti remote code execution and SQL injection

Hi,
Mischa Sallé and Wilco Baan Hofman reported a security issue in cacti to 
Debian when processing arguments passed to the graph settings script:
http://svn.cacti.net/viewvc?view=rev&revision=7454

We consider this issue to be public given the public fix.
Can someone assign a CVE id? We do have some indication that this was reported 
in parallel Fedora, in case anyone from RedHat already assigned a CVE id to 
this.

Thanks!
Nico


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1127165
Comment 1 Swamp Workflow Management 2014-08-14 22:00:13 UTC
bugbot adjusting priority
Comment 2 Alexander Bergmann 2014-08-18 08:55:09 UTC
Via oss-security:

http://seclists.org/oss-sec/2014/q3/386

> http://svn.cacti.net/viewvc?view=rev&revision=7454
> https://bugzilla.redhat.com/show_bug.cgi?id=1127165

> Since there is no check whether $size is actually a number, only that
> it starts with a number ... it's possible to insert commands by adding
> a ';' followed by any command.

Use CVE-2014-5261 for this issue involving shell metacharacters.

> Incomplete and incorrect input parsing leads to ... SQL injection
> attack scenarios

Use CVE-2014-5262 for the SQL injection.
Comment 3 Marcus Meissner 2014-09-16 15:12:36 UTC
patch still missing
Comment 4 Andreas Stieger 2015-06-11 09:51:44 UTC
Already fixed, openSUSE 13.1 and 13.2 are at 0.8.8c via version update.