POC详情: 478758e32b7486a51f67d7111be59ee1a6f41ce9

来源
关联漏洞
标题: Solarwinds Dameware Mini Remote Control agent 输入验证错误漏洞 (CVE-2019-3980)
描述:SolarWinds DameWare Mini Remote Control是美国SolarWinds公司的一款远程控制软件和桌面共享工具。agent是其中的一个代理程序。 Solarwinds Dameware Mini Remote Control agent v12.1.0.89版本中存在输入验证错误漏洞。该漏洞源于网络系统或产品未对输入的数据进行正确的验证。
介绍
# CVE-2019-3980

This repo was created to utilize the Nessus POC with a custom C# executable to run commands on a remote host and get the output of the command.
<br />
<br />
The python file is used to start a web server, execute the exploit, and then get the results over the web server.<br />
The C# exe is uploaded through the exploit to the target. 
When executed on thte target, the exe calls back to the IP/Port specified to get the command to run (path is /cmd).<br />
Once the command finishes, the exe sends the output to the same webserver.
Sending the output is done through a GET request that will generate a 404, but thats fine we just want the base64 data.
<br />
<br />
C# exe has two variables that need to be updated<br />
These variables reference the attacking systems IP and Port<br />
string ip = "10.8.0.3"; <br />
string port = "8000";

<br />
--if port is updated, python script needs to be updated as well, variable to server the HTTP server is below in python script
PORT = 8000 
<br />
Wherever script is launched from needs to contain the file uploaded and well as file called "cmd" which contains the windows commands you want to run.
<br />
<br />
To use this script:<br />
Update variables<br />
create cmd file with commands to run on vulnerable host<br />
compile c# solution contained in zip file <br />
run python script:

python dameware-poc.py -t target_ip -e executable_to_upload
<br />

Example below runs the net users command on the remote host
<br />
![Alt text](/dameware-poc1.png?raw=true&sanitize=true)
<br />
![Alt text](/dameware-poc2.png?raw=true&sanitize=true)
文件快照

[4.0K] /data/pocs/478758e32b7486a51f67d7111be59ee1a6f41ce9 ├── [ 35K] dameware-poc1.png ├── [ 45K] dameware-poc2.png ├── [ 13K] dameware-poc.py ├── [ 16K] Exec.zip └── [1.6K] README.md 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。