Cacti: Unauthenticated Remote Code Execution Exploit in Ruby
This is a dockerized application that is vulnerable to the Cacti RCE vulnerability (CVE-2022-46169). Follow the link to get Cacti running
https://github.com/vulhub/vulhub/tree/master/cacti/CVE-2022-46169
_____ _ _ __ ___ __ ______ ___ ___ _____ _____ ______
/ ____| | | (_) /_ | |__ \ /_ |____ | |__ \|__ \ | __ \ / ____| ____|
| | __ _ ___| |_ _ | | ) | | | / /_____ ) | ) | | |__) | | | |__
| | / _` |/ __| __| | | | / / | | / /______/ / / / | _ /| | | __|
| |____ (_| | (__| |_| | | |_ / /_ _| | / / / /_ / /_ | | \ \| |____| |____
\_____\__,_|\___|\__|_| |_(_)____(_)_|/_/ |____|____| |_| \_\\_____|______|
By @Habib0x
Usage: CVE-2022-46169.rb [options]
-u, --url URL Victim URL
-f, --forwarded FORWARDED X-Forwarded value to bypass the auth
-i, --ip IP IP for reverse shell
-p, --port PORT Port for reverse shell