# N/A
## 概述
在Mitel MiCollab 9.8 SP1 FP2 (9.8.1.201) 及之前版本的NuPoint统一消息(NPM)组件中存在漏洞。该漏洞允许未经身份验证的攻击者执行路径遍历攻击,从而导致未授权访问,攻击者可以查看、篡改或删除用户数据和系统配置。
## 影响版本
- Mitel MiCollab 9.8 SP1 FP2 (9.8.1.201) 及之前版本
## 细节
该漏洞是因为输入验证不充分导致的。攻击者可以通过路径遍历攻击,未经过身份验证就能访问系统文件和数据。
## 影响
成功利用此漏洞可能导致未经授权访问系统文件,攻击者可以查看、篡改或删除用户数据和系统配置。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | None | https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713 | POC详情 |
2 | Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞,并且输入验证不足,未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击,成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置。影响范围:version < MiCollab 9.8 SP2 (9.8.2.12) | https://github.com/zxj-hub/CVE-2024-41713POC | POC详情 |
3 | cve-2024-CVE-2024-41713 | https://github.com/Sanandd/cve-2024-CVE-2024-41713 | POC详情 |
4 | A Python script to detect CVE-2024-41713, a directory traversal vulnerability in Apache HTTP Server, enabling unauthorized access to restricted resources. This tool is for educational purposes and authorized testing only. Unauthorized usage is unethical and illegal. | https://github.com/amanverma-wsu/CVE-2024-41713-Scan | POC详情 |
5 | A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-41713.yaml | POC详情 |
6 | Mitel MiCollab Authentication Bypass to Arbitrary File Read | https://github.com/gunyakit/CVE-2024-41713-PoC-exploit | POC详情 |
暂无评论