Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-34371 PoC — Neo4j 代码问题漏洞

Source
Associated Vulnerability
Title:Neo4j 代码问题漏洞 (CVE-2021-34371)
Description:Neo4j是美国Neo4j公司的一款基于Java的且完全兼容ACID的图形数据库,它支持数据迁移、附加组件等。 neo4j存在代码问题漏洞,该漏洞源于任意反序列化 Java 对象的 RMI 服务。攻击者利用该漏洞可以造成远程代码执行。
Description
CVE-2021-34371.jar
Readme
# CVE-2021-34371.jar
CVE-2021-34371.jar from https://github.com/vulhub/vulhub/tree/master/neo4j/CVE-2021-34371/rhino_gadget

![Image](https://user-images.githubusercontent.com/50495555/132150314-3adfd56f-8c33-4451-a2fe-ddbbe972d371.png)

![Image](https://user-images.githubusercontent.com/50495555/132150357-ea7e4a0c-9b24-4b64-a3dc-963af8f2dd61.png)

USE EXP

![Image](https://user-images.githubusercontent.com/50495555/132150300-d6d7f6ce-3545-4e0e-b459-6a61a70ac577.png)

![Image](https://user-images.githubusercontent.com/50495555/132150307-18cb6a29-68c4-441a-be20-d9218b80a557.png)

File Snapshot

[4.0K] /data/pocs/46d77176401700d7fccbe9aea8edfd9a86a8bebe ├── [ 586] README.md └── [2.3M] rhino_gadget.jar 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.