The following change, courtesy of the Ubuntu cacti-0.8.6i package, fixes the problem:

/usr/share/cacti/include/config.php, line 86:

change:

if (!((is_file($_SERVER["SCRIPT_FILENAME"])) && (substr_count($_SERVER ["SCRIPT_FILENAME"], $_SERVER["PHP_SELF"])))) {

to:

if (!((is_file($_SERVER["SCRIPT_FILENAME"])) && (substr_count($_SERVER ["SCRIPT_FILENAME"], basename($_SERVER["PHP_SELF"]))))) {

Just make sure that if you "fix" the problem (again), that the fix is in the spirit of the actual Cacti security advisory. Currently, I am having a hard time seeing why exactly all these checks are done. Maybe someone could elaborate? I only read something about XSS and SQL injection. Why do these fixes prevent that? Apparently, they have all not been written for the scenario where Cacti is used via Aliases in Apache. So instead of just doing something that makes the error disappear (and potentially again creating security holes) please, someone who has the insight, take a look.
Thanks for listening.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to