Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-35813 PoC — Sitecore 安全漏洞

Source
Associated Vulnerability
Title:Sitecore 安全漏洞 (CVE-2023-35813)
Description:Sitecore是丹麦Sitecore公司的一套在线营销内容管理系统(CMS)。该系统支持内容编辑、多种语言、多网站部署、数字资产管理等。 Sitecore Experience Manager、Experience Platform 、 Experience Commerce 9.0 到 10.3版本存在安全漏洞。攻击者利用该漏洞可以远程执行代码。
Description
An exploit for the Sitecore Remote Code Execution Vulnerability
Readme
Sitecore Remote Code Execution Vulnerability

CVE: 2023-35813 (discovered by @mwulftange)
CVSS Score: 9.8
Severity: Critical 

This is the fantastic blog post from the researchers that found it:
https://code-white.com/blog/exploiting-asp.net-templateparser-part-1/

Figure out what command you want to use, and put it in a file called command.txt
then run command.py to encode it

after it's encoded run the exploit.py script with the hostname of the target as the arg
File Snapshot

[4.0K] /data/pocs/24cec366fc898fd708b8371e8e1c2c430ab46f5c ├── [ 685] command.py ├── [ 359] commandRedirect.txt ├── [ 300] command.txt ├── [ 738] exploit.py └── [ 469] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.