Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2023-39361 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Critical SQL Injection in Cacti's `graph_view.php`. πŸ’₯ **Consequences**: Attackers can modify the database, steal data, and potentially execute remote code (RCE).…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-89**: Improper Neutralization of Special Elements used in an SQL Command. πŸ› **Flaw**: The `rfilter` parameter in the `grow_right_pane_tree` function is not properly sanitized.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: Cacti (Open-source network monitoring). πŸ“… **Affected**: All versions **before 1.2.24**. βœ… **Fixed**: Version 1.2.25 and later are safe.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Privileges**: Can usurp administrative privileges. πŸ’Ύ **Data**: Extract sensitive info like `id`, `username`, and database contents. πŸš€ **Impact**: Remote Code Execution (RCE) is possible via database manipulation.

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Auth**: **NO Authentication Required!** 🌐 **Config**: Default settings allow 'guest' users to access `graph_view.php`. This makes the exploitation threshold **extremely low** and dangerous.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Yes, Public Exploitation Exists**. πŸ“‚ **PoCs**: Available on GitHub (e.g., `vulhub`, `projectdiscovery/nuclei-templates`). πŸ§ͺ **Tools**: Nuclei templates are already published for automated scanning.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for `graph_view.php` with `rfilter` parameter. πŸ› οΈ **Tools**: Use Nuclei with the CVE-2023-39361 template. πŸ“Š **Indicator**: Check if guest access is enabled and version < 1.2.24.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: Upgrade to **Cacti 1.2.25** or newer. πŸ“’ **Advisory**: See GHSA-6r43-q2fw-5wrg on GitHub. 🚫 **No Workarounds**: The vendor states there are no known safe workarounds other than patching.

Q9What if no patch? (Workaround)

🚧 **Mitigation**: If you cannot patch immediately, **disable guest user access** in Cacti settings. πŸ”’ **Network**: Restrict access to `graph_view.php` via firewall/WAF rules.…

Q10Is it urgent? (Priority Suggestion)

πŸ”΄ **Priority: CRITICAL**. πŸ“‰ **CVSS**: 9.8 (High). πŸš€ **Urgency**: Immediate action required. Since it's unauthenticated and affects default configs, automated bots are likely already scanning for this.