NA

CVE-2024-29895

Published: 14/05/2024 Updated: 14/05/2024

Vulnerability Summary

Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc.

Vulnerability Trend

Vendor Advisories

Check Point Reference: CPAI-2024-0293 Date Published: 16 May 2024 Severity: Critical ...

Github Repositories

CVE-2024-29895 | RCE on CACTI 1.3.X dev

CVE-2024-29895 - RCE ON CACTI WarningThis is an educational project, I am not responsible for any use Usage: python3 pocpy -c whoami [-u targetcom] [-f urlstxt] Cacti versions 13X dev where cmd_realtimephp is present and register_argc_argv option is ON Command injection is possible thanks to a bug in an endpoint via get request Dork: Google: inurl:cmd_realtimep

Cacti CVE-2024-29895 POC

CVE-2024-29895 Cacti CVE-2024-29895 POC

Cacti RCE - CVE-2024-29895 Usage: python3 cve-2024-29895py -u targetcom/ -c id Affecting Cacti versions 13X on DEV builds where cmd_realtimephp is present and POLLER_ID is enabled Command Injection is possible via this endpoint, by requesting via GET with payload as HTML Query Parameters Dork: Google: inurl:cmd_realtimephp Shodan: Cacti Hunterhow: /productname=

CVE-2024-29895-CactiRCE-PoC , RCE, POC, CVE-2024-29895

Cacti RCE - CVE-2024-29895 Usage: `python3 CVE-2024-29895py -u targetcom/ Affecting Cacti versions 13X on DEV builds where cmd_realtimephp is present and POLLER_ID is enabled Command Injection is possible via this endpoint, by requesting via GET with payload as HTML Query Parameters so this script will create the user eviladmin Dork: Google: inurl:cmd_realtimeph