Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 14 Feb 2016 16:15:33 +0100
From: Paul Gevers <elbrus@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: cacti: Authentication using web authentication as a
 user, not in the,cacti database allows complete access

[Sorry for breaking the thread, I don't have access to the original mail]

Just a note regarding the proposed patch for CVE-2016-2313.

As I already noted in the original upstream bug report┬╣, I am not
convinced that the "bug" was not (accidental) mis-configuration. I am
convinced that the proposed patch is wrong and told upstream about it.
The patch prevents features of cacti that allow an authenticated user
who is not in the cacti database to get *specified* access to cacti. I
don't know how many setups are using this feature, but the patch is a
regression for those setups. The patch does not change anything in the
configuration tab in the UI, so this at least leads to a confusing
situation.

Paul

┬╣ http://bugs.cacti.net/view.php?id=2656


[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ