Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-34328 PoC — Sielox AnyWare 安全漏洞

Source
Associated Vulnerability
Title:Sielox AnyWare 安全漏洞 (CVE-2024-34328)
Description:Sielox AnyWare是美国Sielox公司的一款门禁管理系统。 Sielox AnyWare v2.1.2版本存在安全漏洞,该漏洞源于开放重定向,可能导致中间人攻击。
Readme

# CVE-2024-34328 Open Redirection via Host Header

## 📝 Overview

**Vulnerability Title**: Open Redirection via Host Header  
**Product**: Sielox AnyWare  
**Version Affected**: 2.1.2  
**CVE ID**: CVE-2024-34328
**Severity**: Medium  
**Attack Vector**: Remote  
**Impact**: Open Redirection / Phishing

---

## 🧨 Description

An attacker can craft a URL with a **modified `Host` header** that points to a malicious domain under their control. When users click the malicious link, they are redirected to the attacker's domain — potentially leading to **phishing**, **credential theft**, or **malware delivery**.

This vulnerability arises due to the application’s improper validation of the `Host` header when generating absolute URLs during redirection.

---

## 🖼️ Proof of Concept (PoC)

### 🔗 Modified Host Header Attack

Below are two images demonstrating the exploit process:

**Step 1**: Malicious URL crafted using the Host header  
![Modified Host Header Exploit](./img1.png)

**Step 2**: Victim is redirected to an attacker-controlled domain  
![Redirected to Attacker Site](./img2.png)

---

## 🛡️ Mitigation

- Validate and sanitize the `Host` header server-side.
- Use a fixed host value for redirection logic.
- Implement allow-lists for trusted redirect domains.
- Avoid dynamic redirects based on untrusted user input.

---

## 🔒 Impact

Successful exploitation may allow attackers to:
- Redirect users to phishing sites
- Bypass security filters that rely on host validation
- Abuse trust relationships between users and the original application

---

## 👨‍💻 Author

Security Researcher – Kevin Suckiel // 0xsu3ks

---

## ⚠️ Legal Note

This research is for **educational purposes and responsible disclosure**. The author is not liable for any misuse of this information.
File Snapshot

[4.0K] /data/pocs/4215ae9bd4eefe56de65c3546fa662dff10c4358 ├── [ 26K] img1.png ├── [ 60K] img2.png └── [1.8K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.