SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Forum/Board/Portal)  >   Cacti Vendors:   RaXnet
Cacti Input Validation Flaw in 'rra_id' Parameter Lets Remote Authenticated Users Inject SQL Commands
SecurityTracker Alert ID:  1034497
SecurityTracker URL:  http://securitytracker.com/id/1034497
CVE Reference:   CVE-2015-8369   (Links to External Site)
Date:  Dec 18 2015
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Exploit Included:  Yes  
Version(s): 0.8.8f and prior
Description:   A vulnerability was reported in Cacti. A remote authenticated user can inject SQL commands.

The 'graph.php' file does not properly validate user-supplied input in the 'rra_id' parameter. A remote authenticated user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

A demonstration exploit URL is provided:

http://[target]/cacti/graph.php?action=properties&local_graph_id=1&rra_id=1%20and%20benchmark(20000000%2csha1(1))--%20&view_type=&graph_start=1448274676&graph_end=1448360776

changzhao.mao (DBAPPSecurity Ltd) reported this vulnerability.

Impact:   A remote authenticated user can execute SQL commands on the underlying database.
Solution:   No solution was available at the time of this entry.
Vendor URL:  cacti.net/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [FD] [CVE-2015-8369] Cacti SQL injection in graph.php

Application: Cacti 
Vendor URL: http://www.cacti.net 
Bugs: SQL injection 
Author:changzhao.mao(DBAPPSecurity Ltd) 
Version affected: 0.8.8f and prior

================================
Introduction
================================

  Cacti is a complete frontend to RRDTool, it stores all of the necessary information to create graphs and populate them with data in a MySQL database. The frontend is completely PHP driven. Along with being able to maintain Graphs, Data Sources, and Round Robin Archives in a database, cacti handles the data gathering. There is also SNMP support for those used to creating traffic graphs with MRTG.  SQL  injection vulnerabilities has been discovered.The vulnerability allows any users  to execute own sql commands to compromise the web-applicaation or database management system.The vulnerabilities are located in the rra_id value of the graph.php file.This php file of older version cacti may be accessible anonymously according to the cases I found from the internet. Latest version cacti may require guest user privilege.

[Vulnerability info]

/cacti-0.8.8f/graph.php
line 25  include "./include/top_graph_header.php"  before validating rra_id
/* set default action */
if (!isset($_REQUEST["action"])) { $_REQUEST["action"] = "view"; }
if (!isset($_REQUEST["view_type"])) { $_REQUEST["view_type"] = ""; }

$guest_account = true;
include("./include/auth.php");
include_once("./lib/rrd.php");

api_plugin_hook_function('graph');

include_once("./lib/html_tree.php");
include_once("./include/top_graph_header.php");

/* ================= input validation ================= */
input_validate_input_regex(get_request_var("rra_id"), "^([0-9]+|all)$");
input_validate_input_number(get_request_var("local_graph_id"));
input_validate_input_number(get_request_var("graph_end"));
input_validate_input_number(get_request_var("graph_start"));
input_validate_input_regex(get_request_var_request("view_type"), "^([a-zA-Z0-9]+)$");
/* ==================================================== */




/cacti-0.8.8f/include/top_graph_header.php 
line 30 rra_id is not validated
 
/* ================= input validation ================= */
input_validate_input_number(get_request_var_request("local_graph_id"));
input_validate_input_number(get_request_var_request("graph_start"));
input_validate_input_number(get_request_var_request("graph_end"));
/* ==================================================== */





line 158
    <?php if ((basename($_SERVER["PHP_SELF"]) == "graph.php") && ($_REQUEST["action"] == "properties")) {?>
    <tr>
        <td valign="top" class='cactiTreeNavigationArea' colspan="3">
            <?php
            $graph_data_array["print_source"] = true;

            /* override: graph start time (unix time) */
            if (!empty($_GET["graph_start"])) {
                $graph_data_array["graph_start"] = get_request_var_request("graph_start");
            }

            /* override: graph end time (unix time) */
            if (!empty($_GET["graph_end"])) {
                $graph_data_array["graph_end"] = get_request_var_request("graph_end");
            }

            print trim(@rrdtool_function_graph(get_request_var_request("local_graph_id"), get_request_var_request("rra_id"), $graph_data_array));
            ?>
            



\cacti-0.8.8f\lib\rrd.php function rrdtool_function_graph line 631
        $rra["timespan"] = 86400;
        }else{
            /* get a list of RRAs related to this graph */
            $rras = get_associated_rras($local_graph_id);

            if (sizeof($rras) > 0) {
                foreach ($rras as $unchosen_rra) {
                    /* the timespan specified in the RRA "timespan" field may not be accurate */
                    $real_timespan = ($ds_step * $unchosen_rra["steps"] * $unchosen_rra["rows"]);

                    /* make sure the current start/end times fit within each RRA's timespan */
                    if ( (($graph_data_array["graph_end"] - $graph_data_array["graph_start"]) <= $real_timespan) && ((time() - $graph_data_array["graph_start"]) <= $real_timespan) ) {
                        /* is this RRA better than the already chosen one? */
                        if ((isset($rra)) && ($unchosen_rra["steps"] < $rra["steps"])) {
                            $rra = $unchosen_rra;
                        }else if (!isset($rra)) {
                            $rra = $unchosen_rra;
                        }
                    }
                }
            }

            if (!isset($rra)) {
                $rra["rows"] = 600;
                $rra["steps"] = 1;
            }
        }
    }else{
    // sql injection here 
        $rra = db_fetch_row("select timespan,rows,steps from rra where id=$rra_id");
    }

    
[Exploit]
    poc: http://192.168.x.x/cacti/graph.php?action=properties&local_graph_id=1&rra_id=1%20and%20benchmark(20000000%2csha1(1))--%20&view_type=&graph_start=1448274676&graph_end=1448360776

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC