Cacti Cross-Site-Scripting Vulnerability Let Attacker Poison Database

by Esmeralda McKenzie
Cacti Cross-Site-Scripting Vulnerability Let Attacker Poison Database

Cacti Cross-Site-Scripting Vulnerability Let Attacker Poison Database

Cacti Execrable-Position-Scripting Vulnerability Flaw Let Attacker Poison Database

A Kept Execrable-Position Scripting (Kept XSS) vulnerability used to be not too prolonged prior to now model in Cacti that allows an authenticated person to poison the records kept in Cacti’s database.

Moreover, administrative accounts can explore this poisoned records, and JS code executes on the sufferer’s browser when considered.

EHA

Cacti is a web based begin-supply network monitoring, fault, and configuration management instrument that acts as an RRDtool (round-robin database instrument). It enables users to ballotservices at specified intervals and provide a ensuing graph.

Cacti Execrable-Position-Scripting Vulnerability

Cacti has a PHP file below the name “report_admin.php,” which displays reporting knowledge about graphs, devices, records sources, etc. This web page will be considered finest by administrative accounts with extra privileges.

This web page will be equipped with a malicious gadget name linked to the graph on the anecdote, which might possibly damage up in kept XSS.

Users who have Customary Administration>Sites/Devices/Records permissions can configure a gadget name in Cacti.

The configuration occurs thru the http:///cacti/host.php and is rendered at http:///cacti/reports_admin.php.

Hence, a menace actor can supply the malicious gadget name on the host.php, and the malicious payload will be carried out on the reports_admin.php.

This malicious payload execution used to be attributable to the concatenation of the $title variable with a non-escaped $description variable on the resolution-pipeline code, ensuing in a malicious JS code affecting the sufferer browser’s DOM. This outcomes in the kept XSS assault.

Administrative accounts explore the reports_admin.php web page with a GET search recordsdata from the place the malicious JS code will get carried out.

The HTTP response for this search recordsdata from contains the malicious payload as an HTML label.

Impact

If menace actors are successful in exploiting this vulnerability, they’ll produce.

  • Myth TakeOver (ATO)
  • Waste malicious actions as the sufferer person
  • Redirecting the person to a malicious web assign
  • Retrieve subtle knowledge by disguising it as the Cacti webpage
  • Browser-based exploitation and attacks
  • Catch a botnet and habits a DDoS assault.

A total anecdote about this Kept XSS vulnerability has been revealed on GitHub, providing extra knowledge relating to the systems of execution and impacts.

Organizations utilizing Cacti are prompt to assemble the records as a text ingredient in the rendered HTML so as that the malicious code block does not salvage carried out in the final HTML output.

Source credit : cybersecuritynews.com

Related Posts