# N/A
## 漏洞概述
Samba版本从3.5.0到4.6.4、4.5.10及4.4.14之间存在远程代码执行漏洞。恶意客户端可以将共享库上传到可写的共享目录,然后诱使服务器加载并执行该库。
## 影响版本
- 3.5.0 - 4.6.4
- 3.5.0 - 4.5.10
- 3.5.0 - 4.4.14
## 漏洞细节
攻击者可以通过上传恶意共享库到服务器的可写共享目录,然后利用该库的加载和执行特性,触发远程代码执行。
## 影响
该漏洞允许攻击者执行任意代码,对服务器进行完全控制,可能导致系统被入侵或控制。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share) | https://github.com/betab0t/cve-2017-7494 | POC详情 |
2 | None | https://github.com/homjxi0e/CVE-2017-7494 | POC详情 |
3 | SambaCry exploit and vulnerable container (CVE-2017-7494) | https://github.com/opsxcq/exploit-CVE-2017-7494 | POC详情 |
4 | CVE-2017-7494 - Detection Scripts | https://github.com/Waffles-2/SambaCry | POC详情 |
5 | It is a simple script to exploit RCE for Samba (CVE-2017-7494 ). | https://github.com/brianwrf/SambaHunter | POC详情 |
6 | Remote root exploit for the SAMBA CVE-2017-7494 vulnerability | https://github.com/joxeankoret/CVE-2017-7494 | POC详情 |
7 | 搭建漏洞利用测试环境 | https://github.com/Zer0d0y/Samba-CVE-2017-7494 | POC详情 |
8 | CVE-2017-7494 C poc | https://github.com/incredible1yu/CVE-2017-7494 | POC详情 |
9 | cve-2017-7494 | https://github.com/cved-sources/cve-2017-7494 | POC详情 |
10 | samba 4.5.9 | https://github.com/john-80/cve-2017-7494 | POC详情 |
11 | A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root. | https://github.com/Hansindu-M/CVE-2017-7494_IT19115344 | POC详情 |
12 | CVE-2017-7494 python exploit | https://github.com/0xm4ud/noSAMBAnoCRY-CVE-2017-7494 | POC详情 |
13 | Exploit CVE-2017-7494 for Net Security course final Assignment. This would reveal the vulnerability of services that run in administrative priority on Linux. | https://github.com/I-Rinka/BIT-EternalBlue-for-macOS_Linux | POC详情 |
14 | None | https://github.com/yinyinmeimei/CVE-2017-7494-payload | POC详情 |
15 | According to researchers with Rapid7, over 110,000 devices appear on internet, which run stable Samba versions, while 92,500 seem to run unstable Samba versions, for which there is no fix. The newest Samba models, including the models 4.6.x before 4.6.4, 4.5.x before 4.5.10 and 3.5.0 before 4.4.13, was impacted by this error. May 24, 2017, Samba released version 4.6.4, which fixes a serious remote code execution vulnerability, vulnerability number CVE-2017-7494, which affected Samba 3.5.0 onwards. Vulnerability number: CVE-2017-7494 Severity Rating: High Affected software: • Samba Version < 4.6.4 • Samba Version < 4.5.10 • Samba Version < 4.4.14 Unaffected software: • Samba Version = 4.6.4 • Samba Version = 4.5.10 • Samba Version = 4.4.14 | https://github.com/adjaliya/-CVE-2017-7494-Samba-Exploit-POC | POC详情 |
16 | SambaCry exploit (CVE-2017-7494) | https://github.com/00mjk/exploit-CVE-2017-7494 | POC详情 |
17 | SambaCry (CVE-2017-7494) exploit for Samba | bind shell without Metasploit | https://github.com/d3fudd/CVE-2017-7494_SambaCry | POC详情 |
18 | None | https://github.com/yinyinnnnn/CVE-2017-7494-payload | POC详情 |
19 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%85%B6%E4%BB%96%E6%BC%8F%E6%B4%9E/Samba%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-7494.md | POC详情 |
20 | https://github.com/vulhub/vulhub/blob/master/samba/CVE-2017-7494/README.md | POC详情 |
暂无评论