Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create CVE-2023-30534 template for cacti insecure deserialization of filter data #8205

Merged
merged 4 commits into from Dec 13, 2023

Conversation

k0pak4
Copy link
Contributor

@k0pak4 k0pak4 commented Sep 13, 2023

PR Information

Template Validation

I've validated this template locally?

  • YES
  • NO

Additional Details

Screenshot of template use against Cacti 1.2.24 (have tested on 1.2.10 as well)
image

@k0pak4
Copy link
Contributor Author

k0pak4 commented Nov 14, 2023

Hi @DhiyaneshGeek just wanted to check in to see if there's something I can assist with for this PR?

@DhiyaneshGeek
Copy link
Member

Hi @k0pak4 sorry for the delay in response

Is it possible to share the docker-setup instruction to setup a vulnerable environment locally

Looking forward to hear back from you

Thanks

@k0pak4
Copy link
Contributor Author

k0pak4 commented Nov 28, 2023

@DhiyaneshGeek I don't have a docker setup for this, just pulled down the release from Cacti and installed it locally

@DhiyaneshGeek DhiyaneshGeek added the Done Ready to merge label Dec 7, 2023
@DhiyaneshGeek
Copy link
Member

Hi @k0pak4 , i have tested this locally on vulhub/cacti:1.2.22 docker , validated it

i had removed /cacti/ path since it's was not present in the set-up , let me know if these changes looks good

Thanks

@pussycat0x
Copy link
Contributor

Hi @k0pak4 Thank you for your contribution to this project. Your efforts are greatly appreciated. Cheers!

@pussycat0x pussycat0x merged commit d12f148 into projectdiscovery:main Dec 13, 2023
2 checks passed
@k0pak4
Copy link
Contributor Author

k0pak4 commented Dec 14, 2023

Sorry for the delay in response. No problem on the removal of /cacti/. It's probably a configurable value depending on where the particular person has installed. Thanks for closing this out!

@k0pak4 k0pak4 deleted the cve-2023-30534 branch December 14, 2023 17:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Done Ready to merge
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants