First published: Mon Sep 07 2015(Updated: )
A vulnerability of auth bypassing was found in Ganglia-web. It's easy to bypass auth by using boolean serialization like this: $ php -r "echo urlencode(serialize(array('user'=>'admin','group'=>'admin', 'token'=>true)));" Vulnerable code: <a href="https://github.com/ganglia/ganglia-web/blob/4e98ea69e0e18b388cdc73809ce54843a16ff87b/lib/GangliaAuth.php#L34-L46">https://github.com/ganglia/ganglia-web/blob/4e98ea69e0e18b388cdc73809ce54843a16ff87b/lib/GangliaAuth.php#L34-L46</a> Upstream report: <a href="https://github.com/ganglia/ganglia-web/issues/267">https://github.com/ganglia/ganglia-web/issues/267</a> CVE assignment: <a href="http://seclists.org/oss-sec/2015/q3/502">http://seclists.org/oss-sec/2015/q3/502</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ganglia |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1260562 is classified as critical due to the authentication bypass vulnerability.
To fix REDHAT-BUG-1260562, update the Ganglia-web to the latest version where the vulnerability has been patched.
REDHAT-BUG-1260562 affects all versions of Ganglia-web prior to the security fix.
The potential risks of REDHAT-BUG-1260562 include unauthorized access and control over the Ganglia-web dashboard.
There is no recommended workaround for REDHAT-BUG-1260562, so upgrading is the best course of action.