On Tuesday 06 May 2008 03:31:34 pm J.M.Roth wrote:
Just make sure that if you fix the problem (again), that the fix is in
the spirit of the actual Cacti security advisory.
afaik it is.
Currently, I am having a hard time seeing why exactly all these checks
are done. Maybe someone could elaborate? I only read something about XSS
and SQL injection. Why do these fixes prevent that?
afaik the vulnerability is that SCRIPT_FILENAME or PHP_SELF could be poisoned
in an XSS attack from a malicious link. this is a corner case as most people
administering cacti don't visit it by clicking on a link from some random
page on teh internets. furthermore, in most situations cacti is set up as an
internal service in a local network, usually not even advertised to the
outside world.
Apparently, they have all not been written for the scenario where Cacti
is used via Aliases in Apache.
this was the problem with the upstream fix, where it is wrongly assumed that a
cacti installation is always installed via being unpacked in the web root
(which has a seperate set of implications, and part of why that is not how
webapps should be installed in debian)
So instead of just doing something that makes the error disappear (and
potentially again creating security holes) please, someone who has the
insight, take a look.
afaik the problem is fixed. you and anyone else are of course encouraged to
give it as much scrutiny as you like.
furthermore i should just point out that the turnaround time for the
regression fix was less than 24 hours. regressions happen, mistakes are
made. after the fact, the only thing you can hope for is a quick and
effective response from the parties involved, which i think in this case was
quite satisfactory.
sean
signature.asc
Description: This is a digitally signed message part.