尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets. | https://github.com/bigb0x/CVE-2024-36401 | POC详情 |
| 2 | POC | https://github.com/Niuwoo/CVE-2024-36401 | POC详情 |
| 3 | Exploiter a Vulnerability detection and Exploitation tool for GeoServer Unauthenticated Remote Code Execution CVE-2024-36401. | https://github.com/RevoltSecurities/CVE-2024-36401 | POC详情 |
| 4 | Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit | https://github.com/Mr-xn/CVE-2024-36401 | POC详情 |
| 5 | None | https://github.com/zgimszhd61/CVE-2024-36401 | POC详情 |
| 6 | None | https://github.com/jakabakos/CVE-2024-36401-GeoServer-RCE | POC详情 |
| 7 | geoserver CVE-2024-36401漏洞利用工具 | https://github.com/MInggongK/geoserver- | POC详情 |
| 8 | geoserver CVE-2024-36401漏洞利用工具 | https://github.com/ahisec/geoserver- | POC详情 |
| 9 | GeoServer Remote Code Execution | https://github.com/Chocapikk/CVE-2024-36401 | POC详情 |
| 10 | None | https://github.com/yisas93/CVE-2024-36401-PoC | POC详情 |
| 11 | Mass scanner for CVE-2024-36401 | https://github.com/justin-p/geoexplorer | POC详情 |
| 12 | Proof-of-Concept Exploit for CVE-2024-36401 GeoServer 2.25.1 | https://github.com/daniellowrie/CVE-2024-36401-PoC | POC详情 |
| 13 | GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions | https://github.com/PunitTailor55/GeoServer-CVE-2024-36401 | POC详情 |
| 14 | geoserver图形化漏洞利用工具 | https://github.com/netuseradministrator/CVE-2024-36401 | POC详情 |
| 15 | None | https://github.com/kkhackz0013/CVE-2024-36401 | POC详情 |
| 16 | CVE-2024-36401-GeoServer Property 表达式注入 Rce woodpecker-framework 插件 | https://github.com/thestar0/CVE-2024-36401-WoodpeckerPlugin | POC详情 |
| 17 | CVE-2024-36401是GeoServer中的一个高危远程代码执行漏洞。GeoServer是一款开源的地理数据服务器软件,主要用于发布、共享和处理各种地理空间数据。 ALIYUN 漏洞原理: 该漏洞源于GeoServer在处理属性名称时,将其不安全地解析为XPath表达式。具体而言,GeoServer调用的GeoTools库API在评估要素类型的属性名称时,以不安全的方式将其传递给commons-jxpath库。由于commons-jxpath库在解析XPath表达式时允许执行任意代码,攻击者可以通过构造特定的输入,利用多个OGC请求参数(如WFS GetFeature、WFS GetPropertyValue、WMS GetMap等),在未经身份验证的情况下远程执行任意代码。 | https://github.com/XiaomingX/cve-2024-36401-poc | POC详情 |
| 18 | CVE-2024-36401 GeoServer Remote Code Execution | https://github.com/0x0d3ad/CVE-2024-36401 | POC详情 |
| 19 | GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions | https://github.com/punitdarji/GeoServer-CVE-2024-36401 | POC详情 |
| 20 | GeoServer(CVE-2024-36401/CVE-2024-36404)漏洞利用工具 | https://github.com/whitebear-ch/GeoServerExploit | POC详情 |
| 21 | geoserver图形化漏洞利用工具 | https://github.com/wellwornele/CVE-2024-36401 | POC详情 |
| 22 | geoserver图形化漏洞利用工具 | https://github.com/unlinedvol/CVE-2024-36401 | POC详情 |
| 23 | geoserver图形化漏洞利用工具 | https://github.com/wingedmicroph/CVE-2024-36401 | POC详情 |
| 24 | CVE-2024-36401 图形化利用工具,支持各个JDK版本利用以及回显、内存马实现 | https://github.com/bmth666/GeoServer-Tools-CVE-2024-36401 | POC详情 |
| 25 | In the GeoServer version prior to 2.25.1, 2.24.3 and 2.23.5 of GeoServer, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-36401.yaml | POC详情 |
| 26 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/GeoServer%20%E5%B1%9E%E6%80%A7%E5%90%8D%E8%A1%A8%E8%BE%BE%E5%BC%8F%E5%89%8D%E5%8F%B0%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-36401.md | POC详情 |
| 27 | https://github.com/vulhub/vulhub/blob/master/geoserver/CVE-2024-36401/README.md | POC详情 | |
| 28 | None | https://github.com/y1s4s/CVE-2024-36401-PoC | POC详情 |
| 29 | 本脚本是针对 GeoServer 的远程代码执行漏洞(CVE-2024-36401)开发的 PoC(Proof of Concept)探测工具。该漏洞允许攻击者通过构造特定请求,在目标服务器上执行任意命令。 | https://github.com/amoy6228/CVE-2024-36401_Geoserver_RCE_POC | POC详情 |
| 30 | Python exploit for GeoServer (CVE-2024-36401) with JSP web shell upload | https://github.com/holokitty/Exploit-CVE-2024-36401 | POC详情 |
| 31 | CVE-2024-36401-GeoServer Property 表达式注入 Rce woodpecker-framework 插件 | https://github.com/funnyDog896/CVE-2024-36401-WoodpeckerPlugin | POC详情 |
| 32 | An Python Exp For "GeoServer" | https://github.com/URJACK2025/CVE-2024-36401 | POC详情 |
| 33 | Geoserver RCE | https://github.com/mantanhacker/CVE-2024-36401-MASS | POC详情 |
| 34 | Python exploit for GeoServer (CVE-2024-36401) with JSP web shell upload | https://github.com/reveravip/Exploit-CVE-2024-36401 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论