Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-27963 PoC — SonLogger 访问控制错误漏洞

Source
Associated Vulnerability
Title:SonLogger 访问控制错误漏洞 (CVE-2021-27963)
Description:Sonlogger是土耳其 (Sonlogger)公司的一个应用软件。提供防火墙日志分析定位功能。 SonLogger before 6.4.1 存在安全漏洞,该漏洞允许未经身份验证的上传任意文件攻击者可以向/User/saveUser发送POST请求,而无需任何身份验证或会话标头。
Description
SonLogger Vulns (CVE-2021-27963, CVE-2021-27964)
Readme
## CVE-2021-27964 | SonLogger - Unauthenticated Arbitrary File Upload (Metasploit)

* Date: 30-01-2021
* Exploit Author: Berkan Er <b3rsec@protonmail.com>
* Vendor Homepage: https://www.sonlogger.com/
* Software Link: https://www.sonlogger.com/download
* Version: 4.2.3.3
* Tested on: Windows 10 Enterprise x64
* CVE: 2021-27964
* Disclosure Date: 01-03-2021

This module exploits an unauthenticated arbitrary file upload via insecure POST request. It has been tested on version 4.2.3.3 in Windows 10 Enterprise.

#### POC:
[![asciicast](https://asciinema.org/a/389082.svg)](https://asciinema.org/a/389082)

---

## CVE-2021-27963 | SonLogger - Insecure SuperAdmin Creation (Python)

* Date: 30-01-2021
* Exploit Author: Berkan Er <b3rsec@protonmail.com>
* Vendor Homepage: https://www.sonlogger.com/
* Software Link: https://www.sonlogger.com/download
* Version: 4.2.3.3
* Tested on: Windows 10 Enterprise x64
* CVE: 2021-27963
* Disclosure Date: 01-03-2021

This module exploit creates user with superadmin profile and shows some information about the application via insecure POST request. It has been tested on version 4.2.3.3 in Windows 10 Enterprise.

#### POC:
[![asciicast](https://asciinema.org/a/394640.svg)](https://asciinema.org/a/394640)
File Snapshot

[4.0K] /data/pocs/3b7d9d61482ad1bc80c1af1e06e941de514bbee0 ├── [1.2K] README.md ├── [4.3K] sonlogger_arbitrary_fileupload.rb └── [3.1K] sonlogger-superadmin_create.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.