Описание
Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| cacti | fixed | 0.8.8e+ds1-1 | package | |
| cacti | fixed | 0.8.8b+dfsg-8+deb8u2 | jessie | package |
| cacti | fixed | 0.8.8a+dfsg-5+deb7u6 | wheezy | package |
Примечания
http://www.cacti.net/release_notes_1_0_0.php
http://bugs.cacti.net/view.php?id=2452 (not accessible: marked as security issue)
http://svn.cacti.net/viewvc?view=rev&revision=7731
This CVE was fixed by introduction of the function sanitize_unserialize_selected_items
in version 0.8.8e and calling it instead of unserialize(stripslashes()).
Affected files require authenticated users.
Связанные уязвимости
Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).
Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).
Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).