ASA-201712-2 generated external raw

[ASA-201712-2] cacti: multiple issues
Arch Linux Security Advisory ASA-201712-2 ========================================= Severity: High Date : 2017-12-02 CVE-ID : CVE-2017-16641 CVE-2017-16660 CVE-2017-16661 CVE-2017-16785 Package : cacti Type : multiple issues Remote : Yes Link : Summary ======= The package cacti before version 1.1.28-1 is vulnerable to multiple issues including arbitrary code execution, arbitrary command execution, cross-site scripting and arbitrary filesystem access. Resolution ========== Upgrade to 1.1.28-1. # pacman -Syu "cacti>=1.1.28-1" The problems have been fixed upstream in version 1.1.28. Workaround ========== None. Description =========== - CVE-2017-16641 (arbitrary command execution) lib/rrd.php in Cacti 1.1.27 allows remote authenticated administrators to execute arbitrary OS commands via the path_rrdtool parameter in an action=save request to settings.php. - CVE-2017-16660 (arbitrary code execution) Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header. - CVE-2017-16661 (arbitrary filesystem access) Cacti 1.1.27 allows remote authenticated administrators to read arbitrary files by placing the Log Path into a private directory, and then making a clog.php?filename= request, as demonstrated by filename=passwd (with a Log Path under /etc) to read /etc/passwd. - CVE-2017-16785 (cross-site scripting) Cacti 1.1.27 has reflected XSS via the PATH_INFO to host.php. Impact ====== A remote authenticated admin user is able to read arbitrary files, execute arbitrary code and commands on the affected host. An unauthenticated user is able to perform cross-site scripting attacks. References ==========