Advisories Blog | G5 Cyber Security

Mandriva Linux Security Advisory 2010-160

Mandriva Linux Security Advisory 2010-160 – Multiple cross-site scripting vulnerabilities in Cacti before 0.8.7f, allow remote attackers to inject arbitrary web script or HTML via the description parameter to host.php, or the host_id parameter to data_sources.php. Cacti before 0.8.7f, allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the FQDN field of a Device or the Vertical Label field of a Graph Template. Cross-site scripting vulnerability in include/top_graph_header.php in Cacti before 0.8.7g allows remote attackers to inject arbitrary web script or HTML via the graph_start parameter to graph.php. Cross-site scripting vulnerability in utilities.php in Cacti before 0.8.7g, allows remote attackers to inject arbitrary web script or HTML via the filter parameter. Multiple cross-site scripting vulnerabilities in Cacti before 0.8.7g, allow remote attackers to inject arbitrary web script or HTML via the name element in an XML template to templates_import.php; and allow remote authenticated administrators to inject arbitrary web script or HTML via vectors related to data_input.php, gprint_presets.php, graphs.php, graph_templates_items.php, host_templates.php, lib/html_form.php, lib/html_tree.php, tree.php, and user_admin.php. This update provides cacti 0.8.7f, which is not vulnerable to these issues.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/93065/MDVSA-2010-160.txt

Source: https://packetstormsecurity.com/files/93065/Mandriva-Linux-Security-Advisory-2010-160.html

Exit mobile version