Code to support my [CVE-2022-28219 analysis](https://attackerkb.com/topics/Zx3qJlmRGY/cve-2022-28219/rapid7-analysis).
To execute, with Ruby and Rubygems installed:
```
gem install httparty
ruby ./manageengine-poc.rb <target> <port> <domain> <your ip>
```
This is designed as a proof of concept, not a stable exploit. It only runs calc. :)
[4.0K] /data/pocs/047d1bec84b5d6b453d34f3ea38f4b00adc94334
├── [2.8K] execute-calc.bin
├── [1.2K] manageengine-get-password-hash.rb
├── [2.4K] manageengine-list-files.rb
├── [ 251] manageengine-plant-file.rb
├── [8.3K] manageengine-poc.rb
└── [ 343] README.md
0 directories, 6 files