7.2
CVSSv3

CVE-2020-14295

Published: 17/06/2020 Updated: 07/11/2023
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cacti cacti 1.2.12

fedoraproject fedora 31

fedoraproject fedora 32

Vendor Advisories

Debian Bug report logs - #963139 cacti: CVE-2020-14295 Package: src:cacti; Maintainer for src:cacti is Cacti Maintainer <pkg-cacti-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 19 Jun 2020 15:21:02 UTC Severity: important Tags: security, upstream Found in version ca ...

Exploits

Cacti version 1212 remote code execution exploit that leverages a remote SQL vulnerability ...

Github Repositories

Proof of Concept for CVE-2020-14295.

CVE-2020-14295 CVE-2020-14295 proof of concept The original post can be found at exploit-db Install requirements python3 -m pip install -r requirementstxt Usage $ python3 cacti_sqli_rcepy --help usage: cacti_sqli_rcepy [-h] -t <target/host URL> -u <user> -p <password>

HackTheBox-Monitors Writeup RFI-SQLi-Deserialization-DockerEscape Synopsis “Monitors” is marked as hard difficulty linux machine that features Apache service hosting Wordpress website The HTML source reveals a Wordpress plugin that is vulnerable to RFI (Remote File Inclusion) Using this vulnerability we read configuration file of Wordpress and apache, the former

Authenticated SQL injection to command execution on Cacti 1.2.12

CVE-2020-14295 Vulnerability details - Cacti/cacti#3622 Install pip3 install -r requirementstxt Usage $ /gimme-a-shellpy --help usage: gimme-a-shellpy [-h] -t Target -U Username -P Password -i Shell-IP -p Shell-Port optional arguments: -h, --help show this help message and exit required arguments: -t Target Target URL -U Username Cacti username -P Pas