Munin: Arbitrary file write — GLSA 201710-05

A vulnerability in Munin allows local attackers to overwrite any file accessible to the www-data user.

Affected packages

net-analyzer/munin on all architectures
Affected versions < 2.0.33
Unaffected versions >= 2.0.33

Background

Munin is an open source server monitoring tool.

Description

When Munin is compiled with CGI graphics enabled then the files accessible to the www-data user can be overwritten.

Impact

A local attacker, by setting multiple upper_limit GET parameters, could overwrite files accessible to the www-user.

Workaround

There is no known workaround at this time.

Resolution

All Munin users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-analyzer/munin-2.0.33"
 

References

Release date
October 08, 2017

Latest revision
October 08, 2017: 1

Severity
normal

Exploitable
local

Bugzilla entries