Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-44349 PoC — Anteeo WMS 安全漏洞

Source
Associated Vulnerability
Title:Anteeo WMS 安全漏洞 (CVE-2024-44349)
Description:Anteeo WMS是Anteeo WMS公司的一个功能齐全的数据中心。 Anteeo WMS 4.7.34之前版本存在安全漏洞,该漏洞源于存在SQL注入漏洞,未经身份验证的攻击者可以通过用户名参数和泄露底层数据库中的一些数据来执行任意SQL命令。
Readme
# PoC-CVE-2024-44349

Vulneability found and tested in **Anteeo WMS - v4.7.31**

The vulnerability allows threat actors to craft an SQL command inside the username parameter and disclose data in the underlying database. 
The impacted versions of ANTEEO B2B WMS are from v.4.7.x to v.4.7.34 (excluded).


## Usage
1. `git clone git@github.com:AndreaF17/PoC-CVE-2024-44349.git`
2. `cd PoC-CVE-2024-44349`
3. `python3 -m venv venv`
4. `source venv/bin/activate`
5. `pip3 install -r requirements.txt`
6. `python3 ./main.py -t TARGET -m [MODE]`
### Modes
Before starting a MODE the script check if ANTEEO is vulnerable and procedes.
The available modes are:
- **dump**: `python3 ./main.py -t TARGET -m dump`, dumps the DB.
- **query**: `python3 ./main.py -t TARGET -m query`, opens a shell where you can send SQL query on the server.

## Utils Directory
Inside the `utils/utils.py` there are some functions to extract data from the DB.

# Terms of Use
This PoC was developed for research and educational purposes only. It is provided "as-is," without any warranties, and the author takes no responsibility for any damage caused by its use.

By using this PoC, you agree that:
- It should only be used in environments you own or have explicit permission to test.
- Any misuse, illegal, or unethical use is strictly prohibited.
- The author will not be liable for any direct, indirect, or incidental damages arising from its use.

Use at your own risk and ensure compliance with applicable laws.
File Snapshot

[4.0K] /data/pocs/34fa885e7c20e6729fbf5ef94057e563ac3389b9 ├── [2.4K] main.py ├── [1.5K] README.md ├── [ 84] requirements.txt └── [4.0K] util └── [6.8K] utils.py 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.