Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-9513 PoC — NetAdmin IAM 安全漏洞

Source
Associated Vulnerability
Title:NetAdmin IAM 安全漏洞 (CVE-2024-9513)
Description:NetAdmin IAM是NetAdmin公司的一款应用程序。 NetAdmin IAM 3.5版本及之前版本存在安全漏洞,该漏洞源于对参数username的不当操作会导致信息泄露。
Readme
# Exploit Title: CVE-2024-9513 - NetAdmin IAM Allows User Enumeration In Active Directory

### Date:  2024-10-04
### Exploit Author: Elizeu Das Dores (ELIZEUOPAIN)
### Vendor Homepage: https://netadmin.software/
### Version: 3.5
### Tested on: 20224-10-05
### CVE : CVE-2024-9513
### References: https://www.cve.org/CVERecord?id=CVE-2024-9513
### Description
A vulnerability was found in Netadmin Software NetAdmin IAM up to 3.5 and classified as problematic. Affected by this issue is some unknown functionality of the file /controller/api/Answer/ReturnUserQuestionsFilled of the component HTTP POST Request Handler. The manipulation of the argument username leads to information exposure through discrepancy. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure is planning to release a fix in mid-October 2024.
File Snapshot

[4.0K] /data/pocs/061a7d0f16d264164383f7370a78ef83fe13bf06 ├── [2.9K] CVE-2024-9513.sh └── [1000] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.