Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For:
No PoCs from references.
- https://github.com/0xN7y/CVE-2022-46169
- https://github.com/0xZon/CVE-2022-46169-Exploit
- https://github.com/0xf4n9x/CVE-2022-46169
- https://github.com/0xsyr0/OSCP
- https://github.com/1f3lse/taiE
- https://github.com/20142995/pocsuite3
- https://github.com/4m4Sec/CVE-2022-46169
- https://github.com/AMatheusFeitosaM/OSCP-Cheat
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Anekant-Singhai/Exploits
- https://github.com/Anthonyc3rb3ru5/CVE-2022-46169
- https://github.com/BKreisel/CVE-2022-46169
- https://github.com/EnriqueSanchezdelVillar/NotesHck
- https://github.com/Faizan-Khanx/OSCP
- https://github.com/FredBrave/CVE-2022-46169-CACTI-1.2.22
- https://github.com/HPT-Intern-Task-Submission/CVE-2022-46169
- https://github.com/Habib0x0/CVE-2022-46169
- https://github.com/Inplex-sys/CVE-2022-46169
- https://github.com/J1ezds/Vulnerability-Wiki-page
- https://github.com/JacobEbben/CVE-2022-46169_unauth_remote_code_execution
- https://github.com/JoshMorrison99/my-nuceli-templates
- https://github.com/Loginsoft-LLC/Linux-Exploit-Detection
- https://github.com/Loginsoft-Research/Linux-Exploit-Detection
- https://github.com/MarkStrendin/CVE-2022-46169
- https://github.com/MrRooten/burp-rs
- https://github.com/N1arut/CVE-2022-46169_POC
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/RdBBB3/SHELL-POC-CVE-2022-46169
- https://github.com/ReflectedThanatos/OSCP-cheatsheet
- https://github.com/Rickster5555/EH2-PoC
- https://github.com/Safarchand/CVE-2022-46169
- https://github.com/Safe3/CVS
- https://github.com/SantoriuHen/NotesHck
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/SirElmard/ethical_hacking
- https://github.com/SystemVll/CVE-2022-46169
- https://github.com/TasosY2K/camera-exploit-tool
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/CVE
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/VishuGahlyan/OSCP
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/a1665454764/CVE-2022-46169
- https://github.com/adavinchi/Wazuh_Cacti
- https://github.com/adnan-kutay-yuksel/tryhackme-all-rooms-database
- https://github.com/ahanel13/CVE-2022-4616-POC
- https://github.com/akyuksel/tryhackme-all-rooms-database
- https://github.com/alv-david/CVE-2022-46169-Cacti-1.2.22
- https://github.com/antisecc/CVE-2022-46169
- https://github.com/ariyaadinatha/cacti-cve-2022-46169-exploit
- https://github.com/baiyiwei123jkl/1
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/botfather0x0/CVE-2022-46169
- https://github.com/c3rrberu5/CVE-2022-46169
- https://github.com/copyleftdev/PricklyPwn
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/dawnl3ss/CVE-2022-46169
- https://github.com/deadyP00l/CVE-2022-46169
- https://github.com/devAL3X/CVE-2022-46169_poc
- https://github.com/devAL3X/cacti_cve_statistics
- https://github.com/devilgothies/CVE-2022-46169
- https://github.com/doosec101/CVE-2022-46169
- https://github.com/exfilt/CheatSheet
- https://github.com/fazilbaig1/oscp
- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks
- https://github.com/hab1b0x/CVE-2022-46169
- https://github.com/icebreack/CVE-2022-46169
- https://github.com/imjdl/CVE-2022-46169
- https://github.com/jitmondal1/OSCP
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/lof1sec/CVE-2022-46169
- https://github.com/m3ssap0/cacti-rce-cve-2022-46169-vulnerable-application
- https://github.com/manas3c/CVE-POC
- https://github.com/miko550/CVE-2022-46169
- https://github.com/mind2hex/CVE-2022-46169
- https://github.com/mind2hex/CVE-2022-46169-Cacti-v1.2.22-RCE
- https://github.com/mind2hex/gitbook_public
- https://github.com/nickczh/kikibo
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oscpname/OSCP_cheat
- https://github.com/parth45/cheatsheet
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/r1nzleer/RCE-Cacti-1.2.22
- https://github.com/ramosslyz/burp-rs
- https://github.com/revanmalang/OSCP
- https://github.com/rockyroadonline/CVE-2022-46169
- https://github.com/ruycr4ft/CVE-2022-46169
- https://github.com/ruycr4ft/cacti-1.2.22-exploit
- https://github.com/sAsPeCt488/CVE-2022-46169
- https://github.com/sha-16/RCE-Cacti-1.2.22
- https://github.com/taythebot/CVE-2022-46169
- https://github.com/txuswashere/OSCP
- https://github.com/whoforget/CVE-POC
- https://github.com/x00tex/hackTheBox
- https://github.com/xhref/OSCP
- https://github.com/yassinebk/CVE-2022-46169
- https://github.com/youwizard/CVE-POC
- https://github.com/zhanpengliu-tencent/medium-cve