Vulnerability CVE-2020-8813


Published: 2020-02-22

Description:
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.

See advisories in our WLB2 database:
Topic
Author
Date
High
Cacti 1.2.8 Remote Code Execution
Askar
24.02.2020

Type:

CWE-78

(Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') )

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Cacti -> Cacti 

 References:
http://packetstormsecurity.com/files/156537/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html
http://packetstormsecurity.com/files/156538/Cacti-1.2.8-Authenticated-Remote-Code-Execution.html
https://drive.google.com/file/d/1A8hxTyk_NgSp04zPX-23nPbsSDeyDFio/view
https://gist.github.com/mhaskar/ebe6b74c32fd0f7e1eedf1aabfd44129
https://github.com/Cacti/cacti/issues/3285
https://github.com/Cacti/cacti/releases
https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/

Copyright 2020, cxsecurity.com

 

Back to Top