POC详情: 11bc52cb61b040606c40dedb4e89f949020a872a

来源
关联漏洞
标题: Apache HugeGraph 安全漏洞 (CVE-2024-27348)
描述:Apache HugeGraph是美国阿帕奇(Apache)基金会的一个速度快、可扩展性强的图形数据库。 Apache HugeGraph 1.0.0至1.3.0之前版本存在安全漏洞,该漏洞源于存在远程命令执行(RCE)漏洞。
介绍
# Remote Code Execution vulnerability in Apache HugeGraph Server (CVE-2024–27348)

[CVE-2024-27348](https://nvd.nist.gov/vuln/detail/CVE-2024-27348) is a critical Remote Command Execution (RCE) vulnerability in Apache HugeGraph Server, a popular graph database system. The flaw resides in the Gremlin traversal language interface, which allows users to interact with the graph database. An attacker can exploit this vulnerability by sending specially crafted requests to the Gremlin server, potentially gaining the ability to bypass the sandbox and execute arbitrary code on the underlying system.

To mitigate this risk, the Apache Software Foundation recommends users to upgrade to HugeGraph version 1.3.0 or later and ensure it runs on Java 11. Additionally, implementing the built-in authentication system and configuring the "Whitelist-IP/port" function can help restrict access and improve security​.


## Usage
```
python3 exploit.py -t http://<target_host>:<target_port> -c "<cmd>"
```

Detection script:
```
python detect.py --target http://<target_host> --port <target_port> --domain <your_domain>
```

## Disclaimer
This exploit script has been created solely for research and the development of effective defensive techniques. It is not intended to be used for any malicious or unauthorized activities. The script's author and owner disclaim any responsibility or liability for any misuse or damage caused by this software. Just so you know, users are urged to use this software responsibly and only by applicable laws and regulations. Use responsibly.
文件快照

[4.0K] /data/pocs/11bc52cb61b040606c40dedb4e89f949020a872a ├── [2.1K] detect.py ├── [3.0K] exploit.py ├── [1.0K] LICENSE └── [1.5K] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。