Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-13151 PoC — Aerospike 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Aerospike 操作系统命令注入漏洞 (CVE-2020-13151)
Description:Aerospike是美国Aerospike公司的一套NoSQL数据库解决方案。 Aerospike(社区版)4.9.0.5版本中存在安全漏洞。攻击者借助特制的UDF利用该漏洞以当前用户权限在该集群的所有节点上执行任意的操作系统命令。
Readme
# CVE-2020-13151-POC-Aerospike-Server-Host-Command-Execution-RCE-

Reference: https://b4ny4n.github.io/network-pentest/2020/08/01/cve-2020-13151-poc-aerospike.html

`exploit.py` - python code to run
File Snapshot

[4.0K] /data/pocs/4664b1b9d6e9c38e3b38f04f1755d0c1e9c8d40e ├── [6.8K] exploit.py ├── [1.7K] poc.lua └── [ 199] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.