By default, the Cacti setup is closed from accessing from Web. Here is an excerpt from
<Directory /usr/share/cacti/> <IfModule mod_authz_core.c> # httpd 2.4 Require host localhost </IfModule> <IfModule !mod_authz_core.c> # httpd 2.2 Order deny,allow Deny from all Allow from localhost </IfModule> </Directory>
In order, to access the Cacti web interface, most likely, you will be changing this configuration. Commenting out Deny/Require statements will open the Cacti to the local network or Internet. This will create a potential vulnerability to disclose MySQL password contained in scripts under the directory
/usr/share/cacti/scripts/, in particular
/usr/share/cacti/scripts/ss_get_mysql_stats.php.cnf, when trying to access them from Web.
Unfortunately, the folder
/usr/share/cacti/scripts/ is not closed by default as it is done with
We strongly recommend to close any access from the web for these additional directories or files:
Here is an example of httpd configuration that can harden your setup (goes to
<Directory ~ "/usr/share/cacti/(log/|rra/|scripts/|site/scripts/|cli/|\.ssh/|\.boto|.*\.cnf)"> <IfModule mod_rewrite.c> Redirect 404 / </IfModule> <IfModule !mod_rewrite.c> <IfModule mod_authz_core.c> Require all denied </IfModule> <IfModule !mod_authz_core.c> Order deny,allow Deny from all </IfModule> </IfModule> </Directory>
Even if you fully password-protected your Cacti installation using HTTP authentication, it is still recommended to double-secure the directories and files listed above.
Outlining the basic rules:
ss_get_by_ssh.php.cnfoutside the web directory
/usr/share/cacti/scripts/. The recommended location is
/etc/boto.cfginstead (that’s for RDS plugins).
For general inquiries about our open source software and database management tools, please send us your question and someone will contact you.