Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Silly Rails App to demonstrate vuln CVE-2013-0156 | https://github.com/terracatta/name_reverser | POC Details |
| 2 | Inspect all of your heroku apps to see if they are running a vulnerable version of Rails | https://github.com/heroku/heroku-CVE-2013-0156 | POC Details |
| 3 | crack repo from jnunemaker but with version 0.1.8 and rails CVE-2013-0156 vulnerability fixed | https://github.com/josal/crack-0.1.8-fixed | POC Details |
| 4 | Bootstrapped Rails 3.2.10 to test the remote code exploit CVE-2013-0156 | https://github.com/bsodmike/rails-exploit-cve-2013-0156 | POC Details |
| 5 | Arbitrary deserialization that can be used to trigger SQL injection and even Code execution | https://github.com/R3dKn33-zz/CVE-2013-0156 | POC Details |
| 6 | Pseudo shell for CVE-2013-0156. | https://github.com/Jjdt12/kuang_grade_mk11 | POC Details |
| 7 | This script is specifically designed to solve the challenge on PentesterLab for the CVE-2013-0156 exploit | https://github.com/oxBEN10/CVE-2013-0156 | POC Details |
| 8 | This script is specifically designed to solve the challenge on PentesterLab for the CVE-2013-0156 exploit | https://github.com/oxben10/CVE-2013-0156 | POC Details |
| 9 | Infoblox NetMRI virtual appliances before version 7.6.1 are vulnerable to remote code execution (RCE) due to the use of a hardcoded Ruby on Rails session cookie secret key. The Rails web component deserializes session cookies if the signing key is valid. Attackers with knowledge of this key can craft malicious session cookies that are deserialized by the application, leading to arbitrary code execution. This vulnerability is related to the known Ruby on Rails deserialization flaw (CVE-2013-0156). Infoblox did not assign a new CVE for this issue, as it is a result of the underlying Rails vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/infoblox/infoblox-netmri-rails-cookie-rce.yaml | POC Details |
| 10 | Modified ruby script for RCE | https://github.com/7s26simon/CVE-2013-0156 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet