FS#69300 - [cacti] [Security] arbitrary code execution (CVE-2020-35701)
Attached to Project:
Community Packages
Opened by Jonas Witschel (diabonas) - Tuesday, 12 January 2021, 09:17 GMT
Last edited by David Runge (dvzrv) - Thursday, 14 January 2021, 17:19 GMT
Opened by Jonas Witschel (diabonas) - Tuesday, 12 January 2021, 09:17 GMT
Last edited by David Runge (dvzrv) - Thursday, 14 January 2021, 17:19 GMT
|
Details
Summary
======= The package cacti is vulnerable to arbitrary code execution via CVE-2020-35701. Guidance ======== Applying commit 565e0604a53f4988dc5b544d01f4a631eaa80d82 referenced below fixes the issue. References ========== https://security.archlinux.org/AVG-1433 https://asaf.me/2020/12/15/cacti-1-2-0-to-1-2-16-sql-injection/ https://github.com/Cacti/cacti/issues/4022 https://github.com/Cacti/cacti/commit/565e0604a53f4988dc5b544d01f4a631eaa80d82 |
This task depends upon
Closed by David Runge (dvzrv)
Thursday, 14 January 2021, 17:19 GMT
Reason for closing: Fixed
Additional comments about closing: Fix applied with cacti 1.2.16-2
Thursday, 14 January 2021, 17:19 GMT
Reason for closing: Fixed
Additional comments about closing: Fix applied with cacti 1.2.16-2
Will fix this in a pkgrel bump and release asap.