Source: cacti Version: 1.2.7+ds1-1 Severity: important Tags: security upstream Forwarded: https://github.com/Cacti/cacti/issues/3026
Hi, The following vulnerability was published for cacti. CVE-2019-17358[0]: | Cacti through 1.2.7 is affected by multiple instances of | lib/functions.php unsafe deserialization of user-controlled data to | populate arrays. An authenticated attacker could use this to influence | object data values and control actions taken by Cacti or potentially | cause memory corruption in the PHP module. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-17358 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17358 [1] https://github.com/Cacti/cacti/issues/3026 [2] https://github.com/Cacti/cacti/commit/adf221344359f5b02b8aed43dfb6b33ae5d708c8 Please adjust the affected versions in the BTS as needed. Regards, Salvatore