# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | All versions of the Joomla! below 3.4.6 are known to be vulnerable. But exploitation is possible with PHP versions below 5.5.29, 5.6.13 and below 5.5. | https://github.com/ZaleHack/joomla_rce_CVE-2015-8562 | POC详情 |
2 | A proof of concept for Joomla's CVE-2015-8562 vulnerability | https://github.com/RobinHoutevelts/Joomla-CVE-2015-8562-PHP-POC | POC详情 |
3 | CVE-2015-8562 Exploit in bash | https://github.com/atcasanova/cve-2015-8562-exploit | POC详情 |
4 | None | https://github.com/thejackerz/scanner-exploit-joomla-CVE-2015-8562 | POC详情 |
5 | Joomla 1.5 - 3.4.5 Object Injection RCE X-Forwarded-For header | https://github.com/paralelo14/CVE-2015-8562 | POC详情 |
6 | A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE) | https://github.com/VoidSec/Joomla_CVE-2015-8562 | POC详情 |
7 | Adapted CVE-2015-8562 payload | https://github.com/xnorkl/Joomla_Payload | POC详情 |
8 | 没有编写完成,以后学习更多知识在回来完善 | https://github.com/guanjivip/CVE-2015-8562 | POC详情 |
9 | Docker-compose to set up a test environment for exploiting CVE-2015-8562 | https://github.com/lorenzodegiorgi/setup-cve-2015-8562 | POC详情 |
10 | None | https://github.com/Caihuar/Joomla-cve-2015-8562 | POC详情 |
11 | Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015 | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2015/CVE-2015-8562.yaml | POC详情 |
12 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/Joomla%203.4.5%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%20CVE-2015-8562.md | POC详情 |
13 | https://github.com/vulhub/vulhub/blob/master/joomla/CVE-2015-8562/README.md | POC详情 |