Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-43363 PoC — Cacti 代码注入漏洞

Source
Associated Vulnerability
Title:Cacti 代码注入漏洞 (CVE-2024-43363)
Description:Cacti是Cacti团队的一套开源的网络流量监测和分析工具。该工具通过snmpget来获取数据,使用RRDtool绘画图形进行分析,并提供数据和用户管理功能。 Cacti 1.2.27版本存在代码注入漏洞,该漏洞源于存在远程命令执行(RCE)。
Readme
# CVE-2024-43363

CVE-2024-43363 Exploit Script

This Python script is designed to test if a Cacti instance is vulnerable to CVE-2024-43363, a Remote Code Execution (RCE) vulnerability caused by log poisoning.
How the Vulnerability Works:

    Log Poisoning: An attacker injects PHP code into device names, which gets logged by Cacti without proper sanitization.
    Execution: By accessing the logs via a web URL, the injected code is executed, allowing the attacker to run commands on the server.

How the Script Operates:

    Check Version: The script checks if the target Cacti version is vulnerable.
    Create Malicious Device: It attempts to create a device with a PHP code-injected name.
    Check Logs: The script checks if the code appears in the logs and could be executed.

Requirements:

    Python 3.x
    requests library: Install with pip install requests

Usage:

    Clone the repository and navigate to the folder.
    Edit the url and token variables in the script to match your target.
    Run the script:

    bash

python3 cacti_exploit.py
File Snapshot

[4.0K] /data/pocs/73992482aa2440c25b212034f4d25e05d30c036d ├── [1.6K] cacti_exploit.py └── [1.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.