Ganglia Web Arbitrary PHP Code Execution Vulnerability


Description   A remote arbitrary code execution has been identified in the web interface of Ganglia.
A remote attacker could exploit it in order to execute arbitrary PHP code with the same privileges as the web server.
No further information is available.
The ganglia packages provided by Debian Squeeze 6.0 are affected by this vulnerability.
Updated, 31/08/2015:
A proof of concept is available.
     
Vulnerable Products   Vulnerable OS:
Fedora (Red Hat) - 16, 17GNU/Linux (Debian) - 6NetBSD (NetBSD)Vulnerable Software:
     
Solution   Fixed ganglia packages for Debian Squeeze 6.0 are available.
     
CVE   CVE-2012-3448
     
References   - Ganglia : Ganglia Web 3.5.1 Release ? Security Advisory
http://ganglia.info/?p=549
FEDORA-2012-10727 : Fedora 16 Update: ganglia-3.1.7-5.fc16
http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html
FEDORA-2012-10699 : Fedora 17 Update: ganglia-3.1.7-6.fc17
http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html
SecurityTracker : ganglia
http://security-tracker.debian.org/tracker/CVE-2012-3448
NetBSD : www/ganglia-webfrontend
http://ftp.netbsd.org/pub/pkgsrc/current/pkgsrc/www/ganglia-webfrontend/README.html
- DSA 2610-1 : ganglia security update
http://lists.debian.org/debian-security-announce/debian-security-announce-2013/msg00014.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2012-07-13 

 Target Type 
Server 

 Possible exploit 
Remote