ALT-BU-2023-4429-1
Branch sisyphus_e2k update bulletin.
Package cacti updated to version 1.2.24-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-00154
Уязвимость реализации сценария remote_agent.php программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольные команды
Modified: 2025-02-18
CVE-2022-46169
Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For:
- https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216
- https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216
- https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9
- https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9
- https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b
- https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b
- https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
- https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
Package observium-ce updated to version 23.1-alt0.1 for branch sisyphus_e2k.
Closed bugs
Обновить до
Package less updated to version 633-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-00696
Уязвимость утилиты для текстовых терминалов UNIX-подобных систем Less, связанная с некорректной фильтрацией встроенных последовательностей ANSI при обработке элемента -R, позволяющая нарушителю повысить свои привилегии
Modified: 2025-03-25
CVE-2022-46663
In GNU Less before 609, crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal.
- http://www.greenwoodsoftware.com/less/news.609.html
- http://www.greenwoodsoftware.com/less/news.609.html
- [oss-security] 20230207 CVE-2022-46663: less -R filtering bypass
- [oss-security] 20230207 CVE-2022-46663: less -R filtering bypass
- https://github.com/gwsw/less/commit/a78e1351113cef564d790a730d657a321624d79c
- https://github.com/gwsw/less/commit/a78e1351113cef564d790a730d657a321624d79c
- FEDORA-2023-71442d7613
- FEDORA-2023-71442d7613
- GLSA-202310-11
- GLSA-202310-11
- https://www.openwall.com/lists/oss-security/2023/02/07/7
- https://www.openwall.com/lists/oss-security/2023/02/07/7