Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-2024 PoC — Johnson Controls OpenBlue Enterprise Manager Data Collector 授权问题漏洞

Source
Associated Vulnerability
Title:Johnson Controls OpenBlue Enterprise Manager Data Collector 授权问题漏洞 (CVE-2023-2024)
Description:Johnson Controls OpenBlue Enterprise Manager Data Collector是美国江森自控(Johnson Controls)公司的一款工业 PC,可提供与仪表和楼宇自动化系统的连接,以提取 EM 应用程序的数据。 Johnson Controls OpenBlue Enterprise Manager Data Collector 3.2.5.75 之前版本存在安全漏洞,该漏洞源于不正确身份验证,导致在某些情况下允许未经授权的用户访问。
Description
For Aina
File Snapshot

[4.0K] /data/pocs/4a26f0fe0f3e7944cbffd87f8c14ebffb0e46a89 ├── [ 385] bruh.html ├── [4.0K] documentos │   ├── [888K] 301_A42024_Catala.pdf │   ├── [1.5M] 302_A4S2024_Ciencia_tec_en.pdf │   └── [909K] 303_A4S2024_Castella.pdf ├── [4.0K] fotos.cve.diario │   ├── [ 27K] index_icon.ico │   ├── [130K] WhatsApp Image 2024-03-19 at 21.56.32.jpeg │   └── [107K] WhatsApp Image 2024-03-19 at 21.56.33.jpeg ├── [ 677] index.css ├── [4.9K] index.html ├── [4.0K] trim1 │   ├── [4.0K] 1 │   │   ├── [1.3K] CVE 12-09-2023.css │   │   └── [4.9K] CVE 12-09-2023.html │   ├── [4.0K] 10 │   │   ├── [ 738] CVE 14-11-2023.css │   │   └── [4.2K] CVE 14-11-2023.html │   ├── [4.0K] 11 │   │   ├── [ 738] CVE 21-11-2023.css │   │   └── [4.3K] CVE 21-11-2023.html │   ├── [4.0K] 12 │   │   ├── [ 738] CVE 28-11-2023.css │   │   ├── [4.2K] CVE 28-11-2023.html │   │   └── [ 692] final-trim1.html │   ├── [4.0K] 2 │   │   ├── [ 738] CVE 19-09-2023.css │   │   └── [4.6K] CVE 19-09-2023.html │   ├── [4.0K] 3 │   │   ├── [ 738] CVE 26-09-2023.css │   │   └── [4.3K] CVE 26-09-2023.html │   ├── [4.0K] 4 │   │   ├── [ 738] CVE 03-10-2023.css │   │   └── [4.2K] CVE 03-10-2023.html │   ├── [4.0K] 5 │   │   ├── [ 738] CVE 10-10-2023.css │   │   └── [4.2K] CVE 10-10-2023.html │   ├── [4.0K] 6 │   │   ├── [ 738] CVE 17-10-2023.css │   │   └── [4.3K] CVE 17-10-2023.html │   ├── [4.0K] 7 │   │   ├── [ 738] CVE 24-10-2023.css │   │   └── [4.2K] CVE 24-10-2023.html │   ├── [4.0K] 8 │   │   ├── [ 738] CVE 31-10-2023.css │   │   └── [4.2K] CVE 31-10-2023.html │   └── [4.0K] 9 │   ├── [ 738] CVE 07-11-2023.css │   └── [4.3K] CVE 07-11-2023.html ├── [4.0K] trim2 │   ├── [4.0K] 1 │   │   ├── [ 681] CVE 23-01-2024.css │   │   ├── [4.2K] CVE 23-01-2024.html │   │   └── [ 689] final-trim1-atras.html │   ├── [4.0K] 2 │   │   ├── [ 681] CVE 30-01-2024.css │   │   └── [4.0K] CVE 30-01-2024.html │   ├── [4.0K] 3 │   │   ├── [ 681] CVE 06-02-2024.css │   │   └── [4.3K] CVE 06-02-2024.html │   ├── [4.0K] 4 │   │   ├── [ 681] CVE 13-02-2024.css │   │   └── [4.3K] CVE 13-02-2024.html │   ├── [4.0K] 5 │   │   ├── [ 681] CVE 20-02-2024.css │   │   └── [4.1K] CVE 20-02-2024.html │   ├── [4.0K] 6 │   │   ├── [ 681] CVE 27-02-2024.css │   │   └── [4.1K] CVE 27-02-2024.html │   ├── [4.0K] 7 │   │   ├── [ 681] CVE 05-03-2024.css │   │   └── [4.2K] CVE 05-03-2024.html │   ├── [4.0K] 8 │   │   ├── [ 681] CVE 12-03-2024.css │   │   └── [4.1K] CVE 12-03-2024.html │   └── [4.0K] 9 │   ├── [ 708] CVE 19-03-2024.css │   ├── [4.4K] CVE 19-03-2024.html │   └── [ 690] final-trim2.html └── [4.0K] trim3 ├── [4.0K] 1 │   ├── [ 838] CVE 26-03-2024.css │   ├── [2.8K] CVE 26-03-2024.html │   └── [ 688] final-trim2-atras.html ├── [4.0K] 10 │   ├── [ 682] CVE 30-04-2024.css │   └── [4.2K] CVE 30-04-2024.html ├── [4.0K] 2 │   ├── [ 682] CVE 02-04-2024.css │   └── [4.2K] CVE 02-04-2024.html ├── [4.0K] 3 │   ├── [ 682] CVE 09-04-2024.css │   └── [4.2K] CVE 09-09-2024.html ├── [4.0K] 4 │   ├── [ 682] CVE 16-04-2024.css │   └── [4.9K] CVE 16-04-2024.html ├── [4.0K] 5 │   ├── [ 682] CVE 23-04-2024.css │   └── [2.8K] CVE 23-04-2024.html ├── [4.0K] 6 │   ├── [ 682] CVE 30-04-2024.css │   └── [4.2K] CVE 30-04-2024.html ├── [4.0K] 7 │   ├── [ 682] CVE 30-04-2024.css │   └── [4.2K] CVE 30-04-2024.html ├── [4.0K] 8 │   ├── [ 682] CVE 30-04-2024.css │   └── [4.2K] CVE 30-04-2024.html └── [4.0K] 9 ├── [ 682] CVE 30-04-2024.css └── [4.2K] CVE 30-04-2024.html 36 directories, 75 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.