POC详情: 10f3a83518dee009acf7e138d57d0d0a2eb9f283

来源
关联漏洞
标题: Apache HugeGraph 安全漏洞 (CVE-2024-27348)
描述:Apache HugeGraph是美国阿帕奇(Apache)基金会的一个速度快、可扩展性强的图形数据库。 Apache HugeGraph 1.0.0至1.3.0之前版本存在安全漏洞,该漏洞源于存在远程命令执行(RCE)漏洞。
描述
Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit  
介绍
# CVE-2024-27348 🪶

CVE-2024-27348 Proof of concept Exploit RCE in Apache HugeGraph Server

Unauthenticated users can execute OS commands via Groovy injection in Apache HugeGraph Server. 


## Usage 🛠 

Exploit multiple targets ☣️
```
python3 CVE-2024-27348.py -f targets.txt -c "command to execute"
```

Exploit single target 🗡
```
python3 CVE-2024-27348.py -t http://target.tld:8080 -c "command to execute"
```

## Parameters 🧰 

Parameter | Description | Type
------------ | ------------- | -------------
-c/--comand |  Command to execute on target | String
-t/--target | URL, Single target  | String
-f/--file | Multiple targets | File


## Contact Me📇

[Twitter - Milan Jovic](https://twitter.com/milanshiftsec)

[LinkedIn - Milan Jovic](https://www.linkedin.com/in/milan-jovic-sec/)

#### Educational purposes only and cannot be used for law violation or personal gain.
#### The author of this project is not responsible for any possible harm caused by the materials of this project.

文件快照

[4.0K] /data/pocs/10f3a83518dee009acf7e138d57d0d0a2eb9f283 ├── [3.3K] CVE-2024-27348.py ├── [1.0K] LICENSE ├── [1010] README.md └── [ 18] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。