QID 354673

Date Published: 2023-01-25

QID 354673: Amazon Linux Security Advisory for cacti : ALAS-2023-1675

A flaw was found in how cacti grants authorization based on ip address which allows authentication bypass, and possibly arbitrary command execution if a poller_item configured with a poller_action_script_php action is present. this updated cacti package adds a feature allowing an administrator to explicitly list headers suitable for use in client authentication.
This option is not currently enabled by default in order to preserve compatibility but may be set by default in a future release.
This is consistent with the latest upstream cacti releases (1.2.23 and 1.3.0).
Additional details can be found here: https://github.com/cacti/cacti/security/advisories/ghsa-6p93-p743-35gf in order to mitigate the authentication bypass customers must set the new $proxy_headers configuration option in /etc/cacti/db.php appropriately for their environment by either setting it to false or an array of the headers for cacti to trust. additionally, customers are strongly recommended to: 1.
Consider using user authentication via a reverse proxy front end like httpd or nginx 2.
Cacti administrators should configure the client-facing web server or reverse proxy to strip any trusted headers provided by untrusted sources, to prevent them from reaching the cacti server and being used to bypass the authentication process.



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2023-1675 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354673

    Software Advisories
    Advisory ID Software Component Link
    ALAS-2023-1675 amazon linux URL Logo alas.aws.amazon.com/ALAS-2023-1675.html