关联漏洞
描述
Apache CouchDB 3.2.1 - Remote Code Execution (RCE)
介绍
# Apache CouchDB 3.2.1 - Remote Code Execution (RCE) CVE-2022-24706
Date: 2022-01-21
Exploit Author: Konstantin Burov, @_sadshade
Software Link: https://couchdb.apache.org/
Version: 3.2.1 and below
Tested on: Kali 2021.2
Based on 1F98D's Erlang Cookie - Remote Code Execution
Shodan: port:4369 "name couchdb at"
CVE: CVE-2022-24706
References:
https://habr.com/ru/post/661195/
https://www.exploit-db.com/exploits/49418
https://insinuator.net/2017/10/erlang-distribution-rce-and-a-cookie-bruteforcer/
https://book.hacktricks.xyz/pentesting/4369-pentesting-erlang-port-mapper-daemon-epmd#erlang-cookie-rce
文件快照
[4.0K] /data/pocs/2fd36650ef6fe9b5171d3de030980fbe55cca3f1
├── [4.3K] CVE-2022-24706-Exploit.py
└── [ 617] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。