Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-23334 | https://github.com/ox1111/CVE-2024-23334 | POC Details |
| 2 | None | https://github.com/sxyrxyy/aiohttp-exploit-CVE-2024-23334-certstream | POC Details |
| 3 | A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1 | https://github.com/z3rObyte/CVE-2024-23334-PoC | POC Details |
| 4 | aiohttp LFI (CVE-2024-23334) | https://github.com/jhonnybonny/CVE-2024-23334 | POC Details |
| 5 | This repository contains a proof of concept about the exploitation of the aiohttp library for the reported vulnerability CVE-2024-23334. | https://github.com/brian-edgar-re/poc-cve-2024-23334 | POC Details |
| 6 | Expolit for CVE-2024-23334 (aiohttp >= 1.0.5> && <=3.9.1) | https://github.com/binaryninja/CVE-2024-23334 | POC Details |
| 7 | A proof of concept of the LFI vulnerability on aiohttp 3.9.1 | https://github.com/s4botai/CVE-2024-23334-PoC | POC Details |
| 8 | Proof-of-Concept for LFI/Path Traversal vulnerability in Aiohttp =< 3.9.1 | https://github.com/wizarddos/CVE-2024-23334 | POC Details |
| 9 | None | https://github.com/Pylonet/CVE-2024-23334 | POC Details |
| 10 | Proof of concept of the parh traversal in python AioHTTP library =< 3.9.1 | https://github.com/Arc4he/CVE-2024-23334-PoC | POC Details |
| 11 | Bash script to automate Local File Inclusion (LFI) attacks on aiohttp server version 3.9.1. | https://github.com/TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC | POC Details |
| 12 | This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI). | https://github.com/Betan423/CVE-2024-23334-PoC | POC Details |
| 13 | A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1 | https://github.com/BestDevOfc/CVE-2024-23334-PoC | POC Details |
| 14 | aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-23334.yaml | POC Details |
| 15 | https://github.com/vulhub/vulhub/blob/master/python/CVE-2024-23334/README.md | POC Details | |
| 16 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E8%AF%AD%E8%A8%80%E6%BC%8F%E6%B4%9E/Python%20aiohttp%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E%20CVE-2024-23334.md | POC Details |
| 17 | None | https://github.com/0xR00/CVE-2024-23334 | POC Details |
| 18 | None | https://github.com/Sn0wBaall/CVE-2024-23334-PoC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet