CVE-2019-17358

Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP module.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2019-17358 Issue Tracking Third Party Advisory
https://github.com/Cacti/cacti/blob/79f29cddb5eb05cbaff486cd634285ef1fed9326/lib/functions.php#L3109 Exploit Third Party Advisory
https://github.com/Cacti/cacti/commit/adf221344359f5b02b8aed43dfb6b33ae5d708c8 Product Third Party Advisory
https://github.com/Cacti/cacti/issues/3026 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/12/msg00014.html Mailing List Third Party Advisory
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17358.html Third Party Advisory
https://seclists.org/bugtraq/2020/Jan/25
https://security.gentoo.org/glsa/202003-40
https://www.darkmatter.ae/xen1thlabs/ Not Applicable
https://www.debian.org/security/2020/dsa-4604
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2019-17358 Issue Tracking Third Party Advisory
https://github.com/Cacti/cacti/blob/79f29cddb5eb05cbaff486cd634285ef1fed9326/lib/functions.php#L3109 Exploit Third Party Advisory
https://github.com/Cacti/cacti/commit/adf221344359f5b02b8aed43dfb6b33ae5d708c8 Product Third Party Advisory
https://github.com/Cacti/cacti/issues/3026 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/12/msg00014.html Mailing List Third Party Advisory
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17358.html Third Party Advisory
https://seclists.org/bugtraq/2020/Jan/25
https://security.gentoo.org/glsa/202003-40
https://www.darkmatter.ae/xen1thlabs/ Not Applicable
https://www.debian.org/security/2020/dsa-4604
Configurations

Configuration 1 (hide)

cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

History

21 Nov 2024, 04:32

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html -
References () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html - () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html -
References () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html - () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html -
References () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2019-17358 - Issue Tracking, Third Party Advisory () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2019-17358 - Issue Tracking, Third Party Advisory
References () https://github.com/Cacti/cacti/blob/79f29cddb5eb05cbaff486cd634285ef1fed9326/lib/functions.php#L3109 - Exploit, Third Party Advisory () https://github.com/Cacti/cacti/blob/79f29cddb5eb05cbaff486cd634285ef1fed9326/lib/functions.php#L3109 - Exploit, Third Party Advisory
References () https://github.com/Cacti/cacti/commit/adf221344359f5b02b8aed43dfb6b33ae5d708c8 - Product, Third Party Advisory () https://github.com/Cacti/cacti/commit/adf221344359f5b02b8aed43dfb6b33ae5d708c8 - Product, Third Party Advisory
References () https://github.com/Cacti/cacti/issues/3026 - Issue Tracking, Third Party Advisory () https://github.com/Cacti/cacti/issues/3026 - Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/12/msg00014.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/12/msg00014.html - Mailing List, Third Party Advisory
References () https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17358.html - Third Party Advisory () https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17358.html - Third Party Advisory
References () https://seclists.org/bugtraq/2020/Jan/25 - () https://seclists.org/bugtraq/2020/Jan/25 -
References () https://security.gentoo.org/glsa/202003-40 - () https://security.gentoo.org/glsa/202003-40 -
References () https://www.darkmatter.ae/xen1thlabs/ - Not Applicable () https://www.darkmatter.ae/xen1thlabs/ - Not Applicable
References () https://www.debian.org/security/2020/dsa-4604 - () https://www.debian.org/security/2020/dsa-4604 -

Information

Published : 2019-12-12 14:15

Updated : 2024-11-21 04:32


NVD link : CVE-2019-17358

Mitre link : CVE-2019-17358

CVE.ORG link : CVE-2019-17358


JSON object : View

Products Affected

debian

  • debian_linux

cacti

  • cacti

opensuse

  • leap
CWE
CWE-502

Deserialization of Untrusted Data

CWE-787

Out-of-bounds Write