openSUSE Security Update: Security update for cacti, cacti-spine ______________________________________________________________________________ Announcement ID: openSUSE-SU-2020:1106-1 Rating: moderate References: #1115436 #1154087 #1173090 Cross-References: CVE-2020-11022 CVE-2020-11023 CVE-2020-13625 CVE-2020-14295 Affected Products: openSUSE Backports SLE-15-SP1 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for cacti, cacti-spine fixes the following issues: - cacti 1.2.13: * Query XSS vulnerabilities require vendor package update (CVE-2020-11022 / CVE-2020-11023) * Lack of escaping on some pages can lead to XSS exposure * Update PHPMailer to 6.1.6 (CVE-2020-13625) * SQL Injection vulnerability due to input validation failure when editing colors (CVE-2020-14295, boo#1173090) * Lack of escaping on template import can lead to XSS exposure - switch from cron to systemd timers (boo#1115436): + cacti-cron.timer + cacti-cron.service - avoid potential root escalation on systems with fs.protected_hardlinks=0 (boo#1154087): handle directory permissions in file section instead of using chown during post installation - rewrote apache configuration to get rid of .htaccess files and explicitely disable directory permissions per default (only allow a limited, well-known set of directories) This update was imported from the openSUSE:Leap:15.1:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP1: zypper in -t patch openSUSE-2020-1106=1 Package List: - openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64): cacti-spine-1.2.13-bp151.4.12.1 cacti-spine-debuginfo-1.2.13-bp151.4.12.1 cacti-spine-debugsource-1.2.13-bp151.4.12.1 - openSUSE Backports SLE-15-SP1 (noarch): cacti-1.2.13-bp151.4.12.1 References: https://www.suse.com/security/cve/CVE-2020-11022.html https://www.suse.com/security/cve/CVE-2020-11023.html https://www.suse.com/security/cve/CVE-2020-13625.html https://www.suse.com/security/cve/CVE-2020-14295.html https://bugzilla.suse.com/1115436 https://bugzilla.suse.com/1154087 https://bugzilla.suse.com/1173090 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org