vendor:
Cacti
by:
Lucas Amorim
8.8
CVSS
HIGH
Unauthenticated Remote Code Execution
CWE
Product Name: Cacti
Affected Version From: 1.2.2008
Affected Version To: 1.2.2008
Patch Exists: YES
Related CWE: CVE-2020-8813
CPE: a:cacti_project:cacti:1.2.8
Metasploit:
https://www.rapid7.com/db/vulnerabilities/suse-cve-2020-8813/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2020-8813/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2020-8813/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2020-8813/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-8813/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2019-8813/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2019-8813/
Tags: cve,cve2020,cacti,rce,oast
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/, https://github.com/Cacti/cacti/releases, https://gist.github.com/mhaskar/ebe6b74c32fd0f7e1eedf1aabfd44129, https://drive.google.com/file/d/1A8hxTyk_NgSp04zPX-23nPbsSDeyDFio/view, https://nvd.nist.gov/vuln/detail/CVE-2020-8813
Nuclei Metadata: {'max-request': 1, 'vendor': 'cacti', 'product': 'cacti'}
Platforms Tested: Linux
2020
Cacti v1.2.8 – Unauthenticated Remote Code Execution (Metasploit)
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
Mitigation:
Update to the latest version of Cacti (v1.2.8) or apply the vendor-provided patch.