# N/A
## 漏洞概述
Samba 3.0.0 到 3.0.25rc3 版本中的 smbd 组件存在漏洞,允许远程攻击者利用 shell 通配符通过特定函数执行任意命令,特别是在 "username map script" smb.conf 选项启用时。远程认证用户也可以通过其他 MS-RPC 函数执行命令。
## 影响版本
- Samba 3.0.0 到 3.0.25rc3
## 漏洞细节
- **漏洞1**: 通过 `SamrChangePassword` 函数利用 shell 通配符,并在 "username map script" smb.conf 选项启用的情况下,允许远程攻击者执行任意命令。
- **漏洞2**: 通过远程打印机管理中的其他 MS-RPC 函数利用 shell 通配符,允许远程认证用户执行命令。
- **漏洞3**: 通过文件共享管理中的其他 MS-RPC 函数利用 shell 通配符,允许远程认证用户执行命令。
## 影响
该漏洞允许攻击者通过 shell 通配符在易受攻击的 Samba 版本中执行任意命令。这可能导致系统被完全控制,依赖于具体的漏洞利用方式和配置条件。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2007-2447 - Samba usermap script | https://github.com/amriunix/CVE-2007-2447 | POC详情 |
| 2 | A simple exploit for CVE-2007-2447 | https://github.com/b1fair/smb_usermap | POC详情 |
| 3 | Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters. | https://github.com/JoseBarrios/CVE-2007-2447 | POC详情 |
| 4 | None | https://github.com/3x1t1um/CVE-2007-2447 | POC详情 |
| 5 | Exploit for the vulnerability CVE-2007-2447 | https://github.com/xlcc4096/exploit-CVE-2007-2447 | POC详情 |
| 6 | None | https://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3 | POC详情 |
| 7 | Python implementation of 'Username' map script' RCE Exploit for Samba 3.0.20 < 3.0.25rc3 (CVE-2007-2447). | https://github.com/Ziemni/CVE-2007-2447-in-Python | POC详情 |
| 8 | None | https://github.com/0xKn/CVE-2007-2447 | POC详情 |
| 9 | Exploit Samba | https://github.com/ozuma/CVE-2007-2447 | POC详情 |
| 10 | Samba 3.0.20 username map script exploit | https://github.com/un4gi/CVE-2007-2447 | POC详情 |
| 11 | cve-2007-2447 this script was rewrite the part of Metasploit modules to python3 | https://github.com/G01d3nW01f/CVE-2007-2447 | POC详情 |
| 12 | Samba usermap script. | https://github.com/cherrera0001/CVE-2007-2447 | POC详情 |
| 13 | CVE-2007-2447 - Samba usermap script | https://github.com/Alien0ne/CVE-2007-2447 | POC详情 |
| 14 | None | https://github.com/3t4n/samba-3.0.24-CVE-2007-2447-vunerable- | POC详情 |
| 15 | Exploit code for CVE-2007-2447 written in Python3. | https://github.com/xbufu/CVE-2007-2447 | POC详情 |
| 16 | None | https://github.com/s4msec/CVE-2007-2447 | POC详情 |
| 17 | None | https://github.com/0xConstant/CVE-2007-2447 | POC详情 |
| 18 | CVE-2007-2447 | https://github.com/Nosferatuvjr/Samba-Usermap-exploit | POC详情 |
| 19 | None | https://github.com/testaross4/CVE-2007-2447 | POC详情 |
| 20 | CVE-2007-2447 samba remote code execution | https://github.com/mr-l0n3lly/CVE-2007-2447 | POC详情 |
| 21 | CVE-2007-2447 exploit written in python to get reverse shell | https://github.com/HerculesRD/PyUsernameMapScriptRCE | POC详情 |
| 22 | automated script for exploiting CVE-2007-2447 | https://github.com/Aviksaikat/CVE-2007-2447 | POC详情 |
| 23 | None | https://github.com/crypticdante/CVE-2007-2447 | POC详情 |
| 24 | Exploit i used in HTB | https://github.com/bdunlap9/CVE-2007-2447_python | POC详情 |
| 25 | Samba 3.0.20 | https://github.com/MikeRega7/CVE-2007-2447-RCE | POC详情 |
| 26 | Samba Reverse Shell | https://github.com/0xTabun/CVE-2007-2447 | POC详情 |
| 27 | None | https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit | POC详情 |
| 28 | None | https://github.com/H3xL00m/CVE-2007-2447 | POC详情 |
| 29 | None | https://github.com/n3ov4n1sh/CVE-2007-2447 | POC详情 |
| 30 | Samba 3.0.0 - 3.0.25rc3 | https://github.com/Juantos/cve-2007-2447 | POC详情 |
| 31 | None | https://github.com/c0d3cr4f73r/CVE-2007-2447 | POC详情 |
| 32 | Exploit Samba smbd 3.0.20-Debian | https://github.com/Sp3c73rSh4d0w/CVE-2007-2447 | POC详情 |
| 33 | This is a exploit for CVE-2007-2447; Vulnerable SMB | https://github.com/IamLucif3r/CVE-2007-2447-Exploit | POC详情 |
| 34 | Exploit Samba smbd 3.0.20-Debian | https://github.com/0xwh1pl4sh/CVE-2007-2447 | POC详情 |
| 35 | Exploit Samba smbd 3.0.20-Debian | https://github.com/N3rdyN3xus/CVE-2007-2447 | POC详情 |
| 36 | Exploit Samba smbd 3.0.20-Debian | https://github.com/NyxByt3/CVE-2007-2447 | POC详情 |
| 37 | Exploit Samba smbd 3.0.20-Debian | https://github.com/h3xcr4ck3r/CVE-2007-2447 | POC详情 |
| 38 | Exploit Samba smbd 3.0.20-Debian | https://github.com/n3rdh4x0r/CVE-2007-2447 | POC详情 |
| 39 | None | https://github.com/banomaly/CVE-2007-2447 | POC详情 |
| 40 | None | https://github.com/foudadev/CVE-2007-2447 | POC详情 |
| 41 | CVE-2007-2447 samba remote code execution | https://github.com/b3m0x00/CVE-2007-2447 | POC详情 |
| 42 | CVE-2007-2447 samba remote code execution | https://github.com/b33m0x00/CVE-2007-2447 | POC详情 |
| 43 | None | https://github.com/elphon/CVE-2007-2447-Exploit | POC详情 |
| 44 | Exploit Samba smbd 3.0.20-Debian | https://github.com/h3x0v3rl0rd/CVE-2007-2447 | POC详情 |
| 45 | None | https://github.com/DevinLiggins14/SMB-PenTest-Exploiting-CVE-2007-2447-on-Metasploitable-2 | POC详情 |
| 46 | just remeber how small mistake in santisize username could give yoy root access to the full machine | https://github.com/MrRoma577/exploit_cve-2007-2447_again | POC详情 |
| 47 | A Rust implementation of the CVE-2007-2447 exploit targeting Samba smbd 3.0.20-Debian. | https://github.com/nika0x38/CVE-2007-2447 | POC详情 |
| 48 | Hands-on pentest project using Kali Linux vs Metasploitable2. Includes full workflow: Nmap scanning, enumeration, Metasploit exploitation (Samba CVE-2007-2447), post-exploitation validation, and mitigation steps. Repo contains commands, outputs, and report showing both offensive techniques and defensive recommendations. | https://github.com/SeifEldienAhmad/Penetration-Testing-on-Metasploitable2 | POC详情 |
| 49 | None | https://github.com/nulltrace1336/Samba-Exploit-CVE-2007-2447 | POC详情 |
| 50 | None | https://github.com/abdulsaabir/CVE-2007-2447 | POC详情 |
标题: 404 Not Found -- 🔗来源链接
标签:vendor-advisoryx_refsource_APPLE
神龙速读:
从这个网页截图中获取到的关于漏洞的关键信息如下:
- **HTTP Status Code**: 404 Not Found
页面显示了“Not Found”的错误信息,表明服务器无法找到请求的资源。
- **Message**:
- The requested URL was not found on this server.
服务器明确指出请求的URL在服务器上不存在。
- **Potential Vulnerability**:
- **Information Disclosure**: 虽然这是一个标准的404错误消息,但它提供了关于请求资源未找到的确切信息。攻击者可能利用这一点来推测哪些资源存在,哪些不存在。
- **Directory Structure Inference**: 如果攻击者能够通过多次尝试不同的URL路径,他们可能推断出网站的目录结构。
Markdown格式总结如下:
```markdown
## Key Information on Vulnerabilities from the Webpage Screenshot
- **HTTP Status Code**: 404 Not Found
- Indicates that the server could not find the requested resource.
- **Message**:
- "The requested URL was not found on this server."
- Provides specific information about the non-existence of the requested URL on the server.
- **Potential Vulnerability**:
- **Information Disclosure**: The explicit message could be exploited by attackers to infer the existence of other resources.
- **Directory Structure Inference**: Attackers might use this information to deduce the website's directory structure through multiple URL guesses.
```
标题: 404 Not Found -- 🔗来源链接
标签:vdb-entrysignaturex_refsource_OVAL
神龙速读:
从这个网页截图中可以获取到以下关于漏洞的关键信息:
- **Error Code**: NoSuchKey
- **Message**: The specified key does not exist.
- **Key**: repository/search/definition/oval:org.mitre.oval:def:10062
- **RequestId**: 634HT2TRPPJXGBV1
- **HostId**: Hwp1gmGJOjluQ2Yd4tOBPk1uqgO4lVlBmyzqhh+/FhRhnNQci1VwT1xbdFwH8QEn6LQ/tqfPpuxEeYAFQnW9E3dAAHuLW+Ax
从这些信息中,我们可以推断出以下几点:
- **漏洞类型**: 尝试访问一个不存在的资源或键(key),这可能与资源管理或权限设置有关。
- **特定的Key**: 指向了`oval:org.mitre.oval:def:10062`,这可能是一个定义某个特定漏洞或配置检查的OVAL定义ID,但该ID在目标系统中不存在。
- **RequestId和HostId**: 这些唯一标识符有助于追踪具体的请求和主机,便于日志分析和故障排查。
这些关键信息可以帮助安全分析师进一步调查漏洞的来源和影响范围。
暂无评论