On Tuesday 06 May 2008 03:31:34 pm J.M.Roth wrote:
> Just make sure that if you "fix" the problem (again), that the fix is in
> the spirit of the actual Cacti security advisory.

afaik it is.  

> Currently, I am having a hard time seeing why exactly all these checks
> are done. Maybe someone could elaborate? I only read something about XSS
> and SQL injection. Why do these fixes prevent that?

afaik the vulnerability is that SCRIPT_FILENAME or PHP_SELF could be poisoned 
in an XSS attack from a malicious link.  this is a corner case as most people 
administering cacti don't visit it by clicking on a link from some random 
page on teh internets.  furthermore, in most situations cacti is set up as an 
internal service in a local network, usually not even advertised to the 
outside world.

> Apparently, they have all not been written for the scenario where Cacti
> is used via Aliases in Apache.

this was the problem with the upstream fix, where it is wrongly assumed that a 
cacti installation is always installed via being unpacked in the web root 
(which has a seperate set of implications, and part of why that is not how 
webapps should be installed in debian)

> So instead of just doing something that makes the error disappear (and
> potentially again creating security holes) please, someone who has the
> insight, take a look.

afaik the problem is fixed.   you and anyone else are of course encouraged to 
give it as much scrutiny as you like.

furthermore i should just point out that the turnaround time for the 
regression fix was less than 24 hours.  regressions happen, mistakes are 
made.  after the fact, the only thing you can hope for is a quick and 
effective response from the parties involved, which i think in this case was 
quite satisfactory.


        sean

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to