Bug ID 1224229
Summary VUL-0: CVE-2024-25641: cacti: arbitrary file write vulnerability in the "Package Import" feature
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/405057/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee Andreas.Stieger@gmx.de
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC camila.matos@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

Cacti provides an operational monitoring and fault management framework. Prior
to version 1.2.27, an arbitrary file write vulnerability, exploitable through
the "Package Import" feature, allows authenticated users having the "Import
Templates" permission to execute arbitrary PHP code on the web server. The
vulnerability is located within the `import_package()` function defined into
the `/lib/import.php` script. The function blindly trusts the filename and file
content provided within the XML data, and writes such files into the Cacti base
path (or even outside, since path traversal sequences are not filtered). This
can be exploited to write or overwrite arbitrary files on the web server,
leading to execution of arbitrary PHP code or other security impacts. Version
1.2.27 contains a patch for this issue.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-25641
https://www.cve.org/CVERecord?id=CVE-2024-25641
https://github.com/Cacti/cacti/commit/eff35b0ff26cc27c82d7880469ed6d5e3bef6210
https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88


You are receiving this mail because: