Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets. | https://github.com/bigb0x/CVE-2024-36401 | POC Details |
| 2 | POC | https://github.com/Niuwoo/CVE-2024-36401 | POC Details |
| 3 | Exploiter a Vulnerability detection and Exploitation tool for GeoServer Unauthenticated Remote Code Execution CVE-2024-36401. | https://github.com/RevoltSecurities/CVE-2024-36401 | POC Details |
| 4 | Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit | https://github.com/Mr-xn/CVE-2024-36401 | POC Details |
| 5 | None | https://github.com/zgimszhd61/CVE-2024-36401 | POC Details |
| 6 | None | https://github.com/jakabakos/CVE-2024-36401-GeoServer-RCE | POC Details |
| 7 | geoserver CVE-2024-36401漏洞利用工具 | https://github.com/MInggongK/geoserver- | POC Details |
| 8 | geoserver CVE-2024-36401漏洞利用工具 | https://github.com/ahisec/geoserver- | POC Details |
| 9 | GeoServer Remote Code Execution | https://github.com/Chocapikk/CVE-2024-36401 | POC Details |
| 10 | None | https://github.com/yisas93/CVE-2024-36401-PoC | POC Details |
| 11 | Mass scanner for CVE-2024-36401 | https://github.com/justin-p/geoexplorer | POC Details |
| 12 | Proof-of-Concept Exploit for CVE-2024-36401 GeoServer 2.25.1 | https://github.com/daniellowrie/CVE-2024-36401-PoC | POC Details |
| 13 | GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions | https://github.com/PunitTailor55/GeoServer-CVE-2024-36401 | POC Details |
| 14 | geoserver图形化漏洞利用工具 | https://github.com/netuseradministrator/CVE-2024-36401 | POC Details |
| 15 | None | https://github.com/kkhackz0013/CVE-2024-36401 | POC Details |
| 16 | CVE-2024-36401-GeoServer Property 表达式注入 Rce woodpecker-framework 插件 | https://github.com/thestar0/CVE-2024-36401-WoodpeckerPlugin | POC Details |
| 17 | CVE-2024-36401是GeoServer中的一个高危远程代码执行漏洞。GeoServer是一款开源的地理数据服务器软件,主要用于发布、共享和处理各种地理空间数据。 ALIYUN 漏洞原理: 该漏洞源于GeoServer在处理属性名称时,将其不安全地解析为XPath表达式。具体而言,GeoServer调用的GeoTools库API在评估要素类型的属性名称时,以不安全的方式将其传递给commons-jxpath库。由于commons-jxpath库在解析XPath表达式时允许执行任意代码,攻击者可以通过构造特定的输入,利用多个OGC请求参数(如WFS GetFeature、WFS GetPropertyValue、WMS GetMap等),在未经身份验证的情况下远程执行任意代码。 | https://github.com/XiaomingX/cve-2024-36401-poc | POC Details |
| 18 | CVE-2024-36401 GeoServer Remote Code Execution | https://github.com/0x0d3ad/CVE-2024-36401 | POC Details |
| 19 | GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions | https://github.com/punitdarji/GeoServer-CVE-2024-36401 | POC Details |
| 20 | GeoServer(CVE-2024-36401/CVE-2024-36404)漏洞利用工具 | https://github.com/whitebear-ch/GeoServerExploit | POC Details |
| 21 | geoserver图形化漏洞利用工具 | https://github.com/wellwornele/CVE-2024-36401 | POC Details |
| 22 | geoserver图形化漏洞利用工具 | https://github.com/unlinedvol/CVE-2024-36401 | POC Details |
| 23 | geoserver图形化漏洞利用工具 | https://github.com/wingedmicroph/CVE-2024-36401 | POC Details |
| 24 | CVE-2024-36401 图形化利用工具,支持各个JDK版本利用以及回显、内存马实现 | https://github.com/bmth666/GeoServer-Tools-CVE-2024-36401 | POC Details |
| 25 | In the GeoServer version prior to 2.25.1, 2.24.3 and 2.23.5 of GeoServer, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-36401.yaml | POC Details |
| 26 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/GeoServer%20%E5%B1%9E%E6%80%A7%E5%90%8D%E8%A1%A8%E8%BE%BE%E5%BC%8F%E5%89%8D%E5%8F%B0%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-36401.md | POC Details |
| 27 | https://github.com/vulhub/vulhub/blob/master/geoserver/CVE-2024-36401/README.md | POC Details | |
| 28 | None | https://github.com/y1s4s/CVE-2024-36401-PoC | POC Details |
| 29 | 本脚本是针对 GeoServer 的远程代码执行漏洞(CVE-2024-36401)开发的 PoC(Proof of Concept)探测工具。该漏洞允许攻击者通过构造特定请求,在目标服务器上执行任意命令。 | https://github.com/amoy6228/CVE-2024-36401_Geoserver_RCE_POC | POC Details |
| 30 | Python exploit for GeoServer (CVE-2024-36401) with JSP web shell upload | https://github.com/holokitty/Exploit-CVE-2024-36401 | POC Details |
| 31 | CVE-2024-36401-GeoServer Property 表达式注入 Rce woodpecker-framework 插件 | https://github.com/funnyDog896/CVE-2024-36401-WoodpeckerPlugin | POC Details |
| 32 | An Python Exp For "GeoServer" | https://github.com/URJACK2025/CVE-2024-36401 | POC Details |
| 33 | Geoserver RCE | https://github.com/mantanhacker/CVE-2024-36401-MASS | POC Details |
| 34 | Python exploit for GeoServer (CVE-2024-36401) with JSP web shell upload | https://github.com/reveravip/Exploit-CVE-2024-36401 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet