Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-34327 PoC — Sielox AnyWare 安全漏洞

Source
Associated Vulnerability
Title:Sielox AnyWare 安全漏洞 (CVE-2024-34327)
Description:Sielox AnyWare是美国Sielox公司的一款门禁管理系统。 Sielox AnyWare v2.1.2版本存在安全漏洞,该漏洞源于密码重置表单的email address字段未经验证,可能导致SQL注入。
Readme

# CVE-2024-34327 SQL Injection Vulnerability Checker

This script (`V-24-02-001_SQLi_Check.py`) is a **proof-of-concept (PoC)** tool to verify the presence of a **time-based blind SQL injection vulnerability** affecting the `password-reset-token.php` endpoint, identified as **CVE-2024-34327**.

## ⚠️ Disclaimer

This tool is intended **for educational and authorized testing purposes only**. Unauthorized scanning or exploitation of systems without consent is illegal and unethical.

---

## 🔍 Vulnerability Details

- **CVE ID**: CVE-2024-34327  
- **Vulnerability Title**: Time-Based Blind SQL Injection
- **Product**: Sielox AnyWare
- **Version Affected**: 2.1.2
- **Vulnerable Endpoint**: `/auth/password-reset-token.php`  
- **Injection Vector**: `email` parameter in POST data  
- **Exploitation Method**: SQL `SLEEP()` function to measure delay in server response

---

## 🧪 Features

- Automatically sends a crafted POST request with a 10-second SQL delay
- Measures server response time to infer vulnerability
- Randomly generates a `PHPSESSID` cookie value for each run

---

## 🛠 Usage

### Prerequisites

- Python 3.x
- `requests` library (`pip install requests`)

### Command

```bash
python3 V-24-02-001_SQLi_Check.py --url https://target-domain.com
```

### Example

```bash
python3 V-24-02-001_SQLi_Check.py --url https://vulnerable-site.com
```

### Output

- `[+] VULNERABLE` if the server response delay exceeds 9 seconds
- `[-] NOT VULNERABLE` otherwise

---

## 🧾 How It Works

1. Sends a POST request with the payload:
   ```
   data[email]=test@doesnotexist.com'+AND+(SELECT+8161+FROM+(SELECT(SLEEP(10)))uvHC)+AND+'abcd'='abcd
   ```
2. If the response takes **>9 seconds**, the tool reports the server as **VULNERABLE**.
3. All TLS verification warnings are suppressed for testing convenience.

---

## 🧰 Script Internals

- Uses Python’s `requests` library
- Sets common HTTP headers including a realistic `User-Agent` and `Referer`
- Generates a random PHP session ID per request

---

## 🔒 Legal Note

You are responsible for using this tool ethically. The author assumes **no liability** for any misuse.

---

## 👨‍💻 Author

Security Researcher – [Your Name or Alias]  
Feel free to contribute or report issues.
File Snapshot

[4.0K] /data/pocs/2ffaa26ba57d5974fa5a93fb7a3eaf417610cde3 ├── [1.9K] cve-2024-34327.py └── [2.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.