支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 222002f95ad04dbdda8e7ce01a4e29ba454b336c

来源
关联漏洞
标题:VMware Spring Cloud Data Flow 安全漏洞 (CVE-2024-22263)
Description:VMware Spring Cloud Data Flow是美国威睿(VMware)公司的一款用于微服务中流式处理和批处理数据的代码库。 VMware Spring Cloud Data Flow存在安全漏洞,该漏洞源于。上传路径的清理不当,攻击者可以使用精心设计的上传请求将任意文件写入文件系统上的任何位置,甚至可能破坏服务器。
Description
(CVE-2024-22263) Spring Cloud Dataflow Arbitrary File Writing Scanner
介绍
# CVE-2024-22263_Scanner
For Ethical Usage only, Any harmful or malicious activities are not allowed. And it's your own responsibility.

CVE-2024-22263: Spring Cloud Dataflow Arbitrary File Writing


# Usage
```
 ██████╗██╗   ██╗███████╗    ██████╗  ██████╗ ██████╗ ██╗  ██╗      ██████╗ ██████╗ ██████╗  ██████╗ ██████╗ 
██╔════╝██║   ██║██╔════╝    ╚════██╗██╔═████╗╚════██╗██║  ██║      ╚════██╗╚════██╗╚════██╗██╔════╝ ╚════██╗
██║     ██║   ██║█████╗█████╗ █████╔╝██║██╔██║ █████╔╝███████║█████╗ █████╔╝ █████╔╝ █████╔╝███████╗  █████╔╝
██║     ╚██╗ ██╔╝██╔══╝╚════╝██╔═══╝ ████╔╝██║██╔═══╝ ╚════██║╚════╝██╔═══╝ ██╔═══╝ ██╔═══╝ ██╔═══██╗ ╚═══██╗
╚██████╗ ╚████╔╝ ███████╗    ███████╗╚██████╔╝███████╗     ██║      ███████╗███████╗███████╗╚██████╔╝██████╔╝
 ╚═════╝  ╚═══╝  ╚══════╝    ╚══════╝ ╚═════╝ ╚══════╝     ╚═╝      ╚══════╝╚══════╝╚══════╝ ╚═════╝ ╚═════╝ 
                                                                                                             
                                        By: SecureLayer7 (Zeyad Azima)
                            https://github.com/securelayer7/CVE-2024-22263_Scanner
    


usage: CVE-2024-22263.py [-h] [-t TARGET] [-p PORT] [-r REPONAME] [-n PACKAGENAME] [-v VERSION] [-f FILE]

Upload a package to the server.

optional arguments:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        The target to scan (e.g., http://192.168.1.1).
  -p PORT, --port PORT  The port on the target (default: 80).
  -r REPONAME, --repoName REPONAME
                        The repository name (default: local).
  -n PACKAGENAME, --packageName PACKAGENAME
                        The name of the package (default: ../../../poc).
  -v VERSION, --version VERSION
                        The version of the package (default: 1.0.0).
  -f FILE, --file FILE  A file containing a list of targets to scan in the format "http://target,port".
```

## **Options**

- **`-t` or `--target`**: Specify the target server URL (e.g., `http://192.168.1.1`). This option is used when scanning a single target.

- **`-p` or `--port`**: Specify the port on the target server (default: `80`). Use this option to set a specific port for the target server.

- **`-r` or `--repoName`**: Set the repository name where the package will be uploaded (default: `local`).

- **`-n` or `--packageName`**: Set the name of the package (default: `../../../poc`). The package name is the path you want to write the file to..

- **`-v` or `--version`**: Set the version of the package (default: `1.0.0`).

- **`-f` or `--file`**: Specify a file containing a list of targets to scan. Each line in the file should follow the format `http://target,port`. Use this option to scan multiple targets from a file.

## **Scan a Single Target**

To scan a single target with a specific port:

```bash
python3 scanner.py -t http://192.168.1.1 -p 7577
```

## **Scan Multiple Targets from a File**

To scan multiple targets from a file:

```bash
python3 scanner.py -f targets.txt
```

The `targets.txt` file should contain lines in the following format:

```
http://192.168.1.1,7577
http://192.168.1.2,8080
```

## **Custom repository name, package version and package name**

To customize the repository name, package version and package name:
package name is the path you want to write the file to.

```bash
python3 scanner.py -t http://192.168.1.1 -p 7577 -r customRepo -n customPackage -v 2.0.0
```

# Screenshots

![image](https://github.com/user-attachments/assets/e2fc9612-e305-4448-8122-96469983f555)
文件快照

[4.0K] /data/pocs/222002f95ad04dbdda8e7ce01a4e29ba454b336c ├── [6.5K] CVE-2024-22263_Scanner.py └── [4.5K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。