First published: Mon Sep 07 2015(Updated: )
A vulnerability of auth bypassing was found in Ganglia-web. It's easy to bypass auth by using boolean serialization like this: $ php -r "echo urlencode(serialize(array('user'=>'admin','group'=>'admin', 'token'=>true)));" Vulnerable code: <a href="https://github.com/ganglia/ganglia-web/blob/4e98ea69e0e18b388cdc73809ce54843a16ff87b/lib/GangliaAuth.php#L34-L46">https://github.com/ganglia/ganglia-web/blob/4e98ea69e0e18b388cdc73809ce54843a16ff87b/lib/GangliaAuth.php#L34-L46</a> Upstream report: <a href="https://github.com/ganglia/ganglia-web/issues/267">https://github.com/ganglia/ganglia-web/issues/267</a> CVE assignment: <a href="http://seclists.org/oss-sec/2015/q3/502">http://seclists.org/oss-sec/2015/q3/502</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =21 | |
Fedora | =22 | |
Fedora | =23 | |
Ganglia | <=3.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6816 is considered a high severity vulnerability due to its potential to allow unauthorized access.
To fix CVE-2015-6816, update Ganglia-web to a version later than 3.7.0 or apply available patches.
CVE-2015-6816 can lead to unauthorized access to admin functionalities, compromising sensitive data.
CVE-2015-6816 affects Ganglia-web versions up to and including 3.7.0 and Fedora versions 21, 22, and 23.
Yes, CVE-2015-6816 is exploitable remotely by attackers who can craft specific requests to bypass authentication.