![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2022-46169 |
Description: | Cacti is an open source platform which provides a robust and
extensible operational monitoring and fault management framework for
users. In affected versions a command injection vulnerability allows
an unauthenticated user to execute arbitrary code on a server running
Cacti, if a specific data source was selected for any monitored
device. The vulnerability resides in the `remote_agent.php` file. This
file can be accessed without authentication. This function retrieves
the IP address of the client via `get_client_addr` and resolves this
IP address to the corresponding hostname via `gethostbyaddr`. After
this, it is verified that an entry within the `poller` table exists,
where the hostname corresponds to the resolved hostname. If such an
entry was found, the function returns `true` and the client is
authorized. This authorization can be bypassed due to the
implementation of the `get_client_addr` function. The function is
defined in the file `lib/functions.php` and checks serval `$_SERVER`
variables to determine the IP address of the client. The variables
beginning with `HTTP_` can be arbitrarily set by an attacker. Since
there is a default entry in the `poller` table with the hostname of
the server running Cacti, an attacker can bypass the authentication
e.g. by providing the header `Forwarded-For: |
Test IDs: | 1.3.6.1.4.1.25623.1.0.823137 1.3.6.1.4.1.25623.1.0.823142 1.3.6.1.4.1.25623.1.0.823145 1.3.6.1.4.1.25623.1.0.823140 1.3.6.1.4.1.25623.1.0.833194 1.3.6.1.4.1.25623.1.0.893252 1.3.6.1.4.1.25623.1.1.12.2025.7226.1 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-46169 https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216 https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216 https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9 https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9 https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf |