Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For:
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Android(1 tweets) Chrome(1 tweets) Linux(3 tweets) Windows(1 tweets)
List of frequently cited URLs
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
alerts.vulmon.com | 271 |
thehackernews.co | 188 |
cvetrends.com | 52 |
twinybots.ch | 16 |
securityaffairs.com | 13 |
www.helpnetsecurity.com | 9 |
thehackernews.com | 6 |
securityonline.info | 4 |
www.sonarsource.com | 4 |
github.com | 3 |
xcloud.spectrum.colortokens.com | 3 |
Name | URL |
---|---|
0xf4n9x/CVE-2022-46169 | https://github.com/0xf4n9x/CVE-2022-46169 |
Anthonyc3rb3ru5/CVE-2022-46169 | https://github.com/Anthonyc3rb3ru5/CVE-2022-46169 |
sAsPeCt488/CVE-2022-46169 | https://github.com/sAsPeCt488/CVE-2022-46169 |
Inplex-sys/CVE-2022-46169 | https://github.com/Inplex-sys/CVE-2022-46169 |
taythebot/CVE-2022-46169 | https://github.com/taythebot/CVE-2022-46169 |
N1arut/CVE-2022-46169_POC | https://github.com/N1arut/CVE-2022-46169_POC |
Live-Hack-CVE/CVE-2022-46169 | https://github.com/Live-Hack-CVE/CVE-2022-46169 |
hab1b0x/CVE-2022-46169 | https://github.com/hab1b0x/CVE-2022-46169 |
Name | URL |
---|---|
0xf4n9x/CVE-2022-46169 | github.com |
Anthonyc3rb3ru5/CVE-2022-46169 | github.com |
sAsPeCt488/CVE-2022-46169 | github.com |
Inplex-sys/CVE-2022-46169 | github.com |
taythebot/CVE-2022-46169 | github.com |
N1arut/CVE-2022-46169_POC | github.com |
Live-Hack-CVE/CVE-2022-46169 | github.com |
hab1b0x/CVE-2022-46169 | github.com |