Debian Patches

Status for cacti/1.2.24+ds1-1+deb12u4

Patch Description Author Forwarded Bugs Origin Last update
07_cli-include-path.patch Fix cli path
===================================================================
Sean Finney <seanius@debian.org>, Slavko <linux@slavino.sk> not-needed debian 2018-10-13
enable-system-jqueryui-by-putting-cacti-changes-in-main.css.patch Upstream embeds jquery-ui.css, but we want to use the system version of that file. To honor cacti's changes to jquery-ui.css, the delta is
added as an overload in main.css instead.

===================================================================
Paul Gevers <elbrus@debian.org> yes upstream
perl-path.patch Debian has perl on the path
===================================================================
Paul Gevers <elbrus@debian.org> not-needed
font-awesome-path.patch the file on Debian systems is named slightly different
===================================================================
Paul Gevers <elbrus@debian.org> no
dont-process-.github-in-docs.patch =================================================================== no
adapt-check_all_pagest.sh-for-debian.patch =================================================================== no
adapt-check_cli_version.sh-for-debian.patch =================================================================== no
remove-external-images.patch lintian detected privacy breach fix=================================================================== Paul Gevers <elbrus@debian.org> no
CVE-2023-39357.patch [PATCH] Correct against possible SQL Injections TheWitness <thewitness@cacti.net> no 2023-08-04
CVE-2023-39358_1.patch [PATCH] Fixing another SQL Injection issue TheWitness <thewitness@cacti.net> no 2023-08-04
CVE-2023-39358_2.patch [PATCH] Minor update to SQL Injection fix TheWitness <thewitness@cacti.net> no 2023-08-04
CVE-2023-39359.patch [PATCH] Fixing XSS in graphs.php TheWitness <thewitness@cacti.net> no 2023-08-04
CVE-2023-39360.patch [PATCH] QA: Different approach to XSS issue TheWitness <thewitness@cacti.net> no https://github.com/cacti/cacti/commit/bc6dc996745ef0dee3427178c8d87a6402f3fefa 2023-08-04
CVE-2023-39361.patch [PATCH] QA: Additional REGEXP and RLIKE changes TheWitness <thewitness@cacti.net> no 2023-08-04
CVE-2023-39362_1.patch [PATCH] Addressing some potential command level injections TheWitness <thewitness@cacti.net> no 2023-08-04
CVE-2023-39362_2.patch [PATCH] QA: On command injection TheWitness <thewitness@cacti.net> no 2023-08-04
CVE-2023-39364.patch [PATCH] Correct issue with Hijacking Reference URL TheWitness <thewitness@cacti.net> no 2023-08-04
CVE-2023-39365.patch [PATCH] Fixing #5348 - Issues with Regular Expression searches in Cacti

Unchecked Regular expressions can lead to privilege escalation and data leakage
TheWitness <thewitness@cacti.net> no 2023-06-04
0001-Fixing-5318-Multiple-minor-stored-XSS-vulnerabilitie.patch [PATCH] Fixing #5318 - Multiple minor stored XSS vulnerabilities TheWitness <thewitness@cacti.net> no 2023-04-29
0001-Fixing-5318-Additional-XSS-in-Cacti.patch [PATCH] Fixing #5318 - Additional XSS in Cacti TheWitness <thewitness@cacti.net> no 2023-06-19
CVE-2023-39513.patch [PATCH] Fixing #5324 - Over Escaping Debug log
This is an issue between releases due to escaping log entries in the wrong location in the security fix. This change resolves that issue.

Reindex device from GUI - debug info broken due to over escaping
TheWitness <thewitness@cacti.net> no https://github.com/cacti/cacti/commit/23abb0e0a9729bd056b56f4fb5a6fc8e7ebda523 2023-06-04
CVE-2023-49084.patch [PATCH] QA: Increase Cacti Security in four areas TheWitness <thewitness@cacti.net> no https://github.com/cacti/cacti/commit/c3a647e9867ae8e2982e26342630ba9edb2d94b7 2023-11-18
CVE-2023-49085.patch [PATCH] QA: Increase Cacti Security in four areas TheWitness <thewitness@cacti.net> no https://github.com/cacti/cacti/commit/5f451bc680d7584525d18026836af2a1e31b2188 2023-11-18
CVE-2023-49086.patch [PATCH] QA: Fix 2 of 3 - Commits for CVE-2023-49088 and CVE-2023-48086

Missed here https://github.com/Cacti/cacti/security/advisories/GHSA-q7g7-gcf6-wh4x
and here:
https://github.com/Cacti/cacti/security/advisories/GHSA-wc73-r2vw-59pr
TheWitness <thewitness@cacti.net> no https://github.com/cacti/cacti/commit/56f9d99e6e5ab434ea18fa344236f41e78f99c59 2023-12-28
CVE-2023-49088,50250,50569.patch [PATCH] QA: Fix 2 of 3 - Commits for CVE-2023-49088 and CVE-2023-48086

Missed here https://github.com/Cacti/cacti/security/advisories/GHSA-q7g7-gcf6-wh4x
and here:
https://github.com/Cacti/cacti/security/advisories/GHSA-wc73-r2vw-59pr
TheWitness <thewitness@cacti.net> no https://github.com/cacti/cacti/commit/73d9a60e24d6d826e6343b94d833b48c28b68643 2023-12-28
0026-CVE-2024-25641-Merge-pull-request-from-GHSA-7cmj-g5q.patch CVE-2024-25641: Merge pull request from GHSA-7cmj-g5qc-pj88
* QA: Fixing Package Import CVE

For now, we will only accept the Cacti public keys until such time as we are a registered CNA and have the ability to verify third parties or we make other arrangements.

* QA: The keys in our package have trailing spaces

[description]
Cacti provides an operational monitoring and fault management
framework. Prior to version 1.2.27, an arbitrary file write
vulnerability, exploitable through the "Package Import" feature,
allows authenticated users having the "Import Templates" permission to
execute arbitrary PHP code on the web server. The vulnerability is
located within the `import_package()` function defined into the
`/lib/import.php` script. The function blindly trusts the filename and
file content provided within the XML data, and writes such files into
the Cacti base path (or even outside, since path traversal sequences
are not filtered). This can be exploited to write or overwrite
arbitrary files on the web server, leading to execution of arbitrary
PHP code or other security impacts. Version 1.2.27 contains a patch
for this issue.
Petr Macek <petr.macek@kostax.cz> yes upstream backport, https://github.com/Cacti/cacti/commit/eff35b0ff26cc27c82d7880469ed6d5e3bef6210 2024-04-07
0027-1-2-CVE-2024-29894-Merge-pull-request-from-GHSA-grj5.patch [1/2] CVE-2024-29894 Merge pull request from GHSA-grj5-8fcj-34gh
Cacti contain a residual cross-site scripting vulnerability caused by an
incomplete fix for CVE-2023-50250. `raise_message_javascript` from
`lib/functions.php` now uses purify.js to fix CVE-2023-50250 (among
others). However, it still generates the code out of unescaped PHP
variables `$title` and `$header`. If those variables contain single
quotes, they can be used to inject JavaScript code. An attacker
exploiting this vulnerability could execute actions on behalf of
other users. This ability to impersonate users could lead to
unauthorized changes to settings.

[Summary]

CVE-2023-50250, fixed in 1.2.26, can still be triggered with a non-empty file named "');alert(1);('".xml.

[Details]

raise_message_javascript from lib/functions.php now uses purify.js to fix CVE-2023-50250 (among others).
However it still generates the code out of unescaped PHP variables $title and $header.
If those variables contain single quotes, they can be used to inject JavaScript code.
Beuc <beuc@beuc.net> yes upstream https://github.com/Cacti/cacti/commit/9c75f8da5b609d17c8c031fd46362f730358b792 2024-04-07
0028-2-2-CVE-2024-29894-GHSA-grj5-8fcj-34gh-follow-up-fix.patch [2/2] CVE-2024-29894 GHSA-grj5-8fcj-34gh follow-up fix (#5751)
Not sure how this was lost during the back&forth during the
GHSA process but we missed escaping the 3rd parameter of
raise_message_javascript().
Beuc <beuc@beuc.net> yes upstream https://github.com/Cacti/cacti/pull/5751/commits/7c60ef33e2a87b3047d66f651d7a2a096d108e58 2024-05-18
0029-CVE-2024-31443-Merge-pull-request-from-GHSA-rqc8-78c.patch CVE-2024-31443: Merge pull request from GHSA-rqc8-78cm-85j3
some of the data stored in `form_save()` function in
`data_queries.php` is not thoroughly checked and is used to
concatenate the HTML statement in `grow_right_pane_tree()` function
from `lib/html.php` , finally resulting in cross-site scripting.
TheWitness <thewitness@cacti.net> no 2024-04-07
0030-CVE-2024-31444-GHSA-p4ch-7hjw-6m87-XSS-vulnerability.patch CVE-2024-31444 GHSA-p4ch-7hjw-6m87 XSS vulnerability when reading tree rules with Automation API

some of the data stored in `automation_tree_rules_form_save()`
function in `automation_tree_rules.php` is not thoroughly checked and
is used to concatenate the HTML statement in `form_confirm()` function
from `lib/html.php` , finally resulting in cross-site
scripting. Version 1.2.27 contains a patch for the issue.
TheWitness <thewitness@cacti.net> yes upstream https://github.com/Cacti/cacti/commit/86d614c38c54e0ce58774d86617ecfbb853fb57b 2024-04-09
0031-CVE-2024-31445-GHSA-vjph-r677-6pcc-SQL-injection-vul.patch CVE-2024-31445 GHSA-vjph-r677-6pcc SQL injection vulnerability
A SQL injection vulnerability in `automation_get_new_graphs_sql`
function of `api_automation.php` allows authenticated users to exploit
these SQL injection vulnerabilities to perform privilege escalation
and remote code execution. In `api_automation.php` line 856, the
`get_request_var('filter')` is being concatenated into the SQL
statement without any sanitization. In `api_automation.php` line 717,
The filter of `'filter'` is `FILTER_DEFAULT`, which means there is no
filter for it
TheWitness <thewitness@cacti.net> yes upstream https://github.com/Cacti/cacti/commit/fd93c6e47651958b77c3bbe6a01fff695f81e886 2024-04-07
0032-CVE-2024-31458-GHSA-jrxg-8wh8-943x-SQL-injection.patch CVE-2024-31458 GHSA-jrxg-8wh8-943x SQL injection
some of the data stored in `form_save()` function in `graph_template_inputs.php` is
not thoroughly checked and is used to concatenate the SQL statement in
`draw_nontemplated_fields_graph_item()` function from
`lib/html_form_templates.php` , finally resulting in SQL injection.
TheWitness <thewitness@cacti.net> yes upstream https://github.com/Cacti/cacti/commit/9e87882007b6091171d1a4786f0de4ae20efef7b 2024-04-07
0033-CVE-2024-31459-GHSA-cx8g-hvq8-p2rv-remote-code-execu.patch CVE-2024-31459 GHSA-cx8g-hvq8-p2rv remote code execution
There is a file inclusion issue in the lib/plugin.php file.
Combined with SQL injection vulnerabilities, RCE can be implemented.
TheWitness <thewitness@cacti.net> yes upstream https://github.com/Cacti/cacti/commit/96d9a4c60693d87ba0e347f1c7d33047b4effc61 2024-04-07
0034-CVE-2024-31460-GHSA-gj3f-p326-gh8r-SQL-injection.patch CVE-2024-31460 GHSA-gj3f-p326-gh8r SQL injection
some of the data stored in `automation_tree_rules.php` is not
thoroughly checked and is used to concatenate the SQL statement in
`create_all_header_nodes()` function from `lib/api_automation.php` ,
finally resulting in SQL injection. Using SQL based secondary
injection technology, attackers can modify the contents of the Cacti
database, and based on the modified content, it may be possible to
achieve further impact, such as arbitrary file reading, and even
remote code execution through arbitrary file writing
TheWitness <thewitness@cacti.net> yes upstream https://github.com/Cacti/cacti/commit/8b516cb9a73322ad532231e74000c2ee097b495e 2024-04-07
0035-CVE-2024-34340-GHSA-37x7-mfjv-mm7m-type-juggling-vul.patch CVE-2024-34340 GHSA-37x7-mfjv-mm7m type juggling vulnerability
Cacti calls `compat_password_hash` when users set their
password. `compat_password_hash` use `password_hash` if there is it,
else use `md5`. When verifying password, it calls
`compat_password_verify`. In `compat_password_verify`,
`password_verify` is called if there is it, else use
`md5`. `password_verify` and `password_hash` are supported on PHP <
5.5.0, following PHP manual. The vulnerability is in
`compat_password_verify`. Md5-hashed user input is compared with
correct password in database by `$md5 == $hash`. It is a loose
comparison, not `===`. It is a type juggling vulnerability

[backport]
Drop changelog and french translation update
TheWitness <thewitness@cacti.net> yes upstream backport, https://github.com/Cacti/cacti/commit/6183961089980322dfd9fd8011ade0f41703eaea 2024-05-07

All known versions for source package 'cacti'

Links