Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8813 PoC — Cacti 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Cacti 操作系统命令注入漏洞 (CVE-2020-8813)
Description:Cacti是Cacti团队的一套开源的网络流量监测和分析工具。该工具通过snmpget来获取数据,使用RRDtool绘画图形进行分析,并提供数据和用户管理功能。 Cacti 1.2.8版本中的graph_realtime.php文件存在安全漏洞。远程攻击者可借助cookie中的shell元字符利用该漏洞执行任意操作系统命令。
Description
CVE-2020-8813 - RCE through graph_realtime.php in Cacti 1.2.8
Readme
# CVE-2020-8813 - RCE through graph_realtime.php in Cacti 1.2.8 

## Features

 - [x] 

## Description 

graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.

## Usage

```
$ ./CVE-2020-8813.py -h
PoC of CVE-2020-8813 - RCE through graph_realtime.php in Cacti 1.2.8 - by @podalirius_

usage: CVE-2020-8813.py [-h] -t TARGET [-v] [-u USERNAME] [-p PASSWORD] (-L | -c COMMAND) [-k]

options:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        Target URL of the cacti
  -v, --verbose         Verbose mode. (default: False)
  -u USERNAME, --username USERNAME
                        Username to connect to Cacti
  -p PASSWORD, --password PASSWORD
                        Password to connect to Cacti
  -L, --live            Live mode. (default: False)
  -c COMMAND, --command COMMAND
                        Execute a single command
  -k, --insecure        Allow insecure server connections when using SSL (default: False)

```

## References
 - https://nvd.nist.gov/vuln/detail/CVE-2020-8813
 - https://github.com/Cacti/cacti/issues/3285
File Snapshot

[4.0K] /data/pocs/792cccb69b5c7e7588ca8e1bd25418d9b7ee6b4d ├── [6.3K] CVE-2020-8813.py ├── [1.2K] README.md └── [4.0K] test_env ├── [1.8K] Dockerfile └── [ 470] Makefile 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.