CVE-2020-8813
Cacti vulnerability analysis and mitigation

Overview

CVE-2020-8813 affects Cacti version 1.2.8, a web interface for graphing of monitoring systems. The vulnerability was discovered in February 2020 and allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege (NVD, Shells Systems).

Technical details

The vulnerability exists in the graphrealtime.php file where user-controlled input from a cookie value is passed to shellexec function after being concatenated with other strings. The exploit chain requires enabling the 'Guest' view for the graph_realtime.php page and then sending a malicious request to achieve code execution. The attack can be executed by injecting custom strings into the session value using specific payload formatting to bypass restrictions, such as using ${IFS} bash variable to represent spaces (Shells Systems).

Impact

When successfully exploited, this vulnerability allows attackers to execute arbitrary commands on the target system with the permissions of the web server user. The vulnerability can be exploited both in authenticated and unauthenticated scenarios if the 'Guest Realtime Graphs' privilege is enabled (Shells Systems).

Mitigation and workarounds

The vulnerability was patched in Cacti version 1.2.11. Users are advised to upgrade to this version or later. For Debian systems, the fix was included in version 1.2.2+ds1-2+deb10u5. Various Linux distributions have released security updates to address this vulnerability (Gentoo Security, Debian LTS).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management