Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/HPT-Intern-Task-Submission/CVE-2023-39361 | POC Details |
| 2 | Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-39361.yaml | POC Details |
| 3 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Cacti%20graph_view.php%20SQL%E6%B3%A8%E5%85%A5%E5%AF%BC%E8%87%B4%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-39361&CVE-2024-31459.md | POC Details |
| 4 | https://github.com/vulhub/vulhub/blob/master/cacti/CVE-2023-39361/README.md | POC Details | |
| 5 | None | https://github.com/ChoDeokCheol/CVE-2023-39361 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-39359 | 8.8 HIGH | Authenticated SQL injection vulnerability in graphs.php in Cacti |
| CVE-2023-39358 | 8.8 HIGH | Authenticated SQL injection vulnerability in reports_user.php in Cacti |
| CVE-2023-39357 | 8.8 HIGH | A Defect in sql_save() Causes Multiple SQL Injection Vulnerabilities in Cacti |
| CVE-2023-31132 | 7.8 HIGH | Cacti Privilege Escalation |
| CVE-2023-39362 | 7.2 HIGH | Authenticated command injection in SNMP options of a Device |
| CVE-2023-39515 | 6.1 MEDIUM | Stored Cross-site Scripting on data_debug.php datasource path view in Cacti |
| CVE-2023-39514 | 6.1 MEDIUM | Stored Cross-site Scripting on graphs.php data template formated name view in Cacti |
| CVE-2023-39513 | 6.1 MEDIUM | Stored Cross-site Scripting on host.php verbose data-query debug view in Cacti |
| CVE-2023-39512 | 6.1 MEDIUM | Stored Cross-site Scripting on data_sources.php device name view in Cacti |
| CVE-2023-39510 | 6.1 MEDIUM | Stored Cross-site Scripting in reports_admin.php through Device-Name in 'select' input in |
| CVE-2023-39366 | 6.1 MEDIUM | Stored Cross-site Scripting in data_sources.php through Device-Name in 'select' input in C |
| CVE-2023-39360 | 6.1 MEDIUM | Reflected Cross-site Scripting in graphs_new.php in Cacti |
| CVE-2023-39516 | 6.1 MEDIUM | Stored Cross-Site-Scripting on data_sources.php debug html-block in Cacti |
| CVE-2023-39365 | 4.6 MEDIUM | Unchecked regular expressions can lead to SQL Injection and data leakage in Cacti |
| CVE-2023-30534 | 4.3 MEDIUM | Insecure Deserialization in Cacti |
| CVE-2023-39364 | 3.5 LOW | Open redirect in change password functionality in Cacti |
No comments yet