QID 354673
Date Published: 2023-01-25
QID 354673: Amazon Linux Security Advisory for cacti : ALAS-2023-1675
A flaw was found in how cacti grants authorization based on ip address which allows authentication bypass, and possibly arbitrary command execution if a poller_item configured with a poller_action_script_php action is present. this updated cacti package adds a feature allowing an administrator to explicitly list headers suitable for use in client authentication.
This option is not currently enabled by default in order to preserve compatibility but may be set by default in a future release.
This is consistent with the latest upstream cacti releases (1.2.23 and 1.3.0).
Additional details can be found here: https://github.com/cacti/cacti/security/advisories/ghsa-6p93-p743-35gf in order to mitigate the authentication bypass customers must set the new $proxy_headers configuration option in /etc/cacti/db.php appropriately for their environment by either setting it to false or an array of the headers for cacti to trust. additionally, customers are strongly recommended to: 1.
Consider using user authentication via a reverse proxy front end like httpd or nginx 2.
Cacti administrators should configure the client-facing web server or reverse proxy to strip any trusted headers provided by untrusted sources, to prevent them from reaching the cacti server and being used to bypass the authentication process.
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS-2023-1675 -
alas.aws.amazon.com/ALAS-2023-1675.html
CVEs related to QID 354673
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS-2023-1675 | amazon linux |
|