Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-23779 PoC — ZOHO ManageEngine Desktop Central 信息泄露漏洞

Source
Associated Vulnerability
Title:ZOHO ManageEngine Desktop Central 信息泄露漏洞 (CVE-2022-23779)
Description:ZOHO ManageEngine Desktop Central(DC)是美国卓豪(ZOHO)公司的一套桌面管理解决方案。该方案包含软件分发、补丁管理、系统配置、远程控制等功能模块,可对桌面机以及服务器管理的整个生命周期提供支持。 ZOHO ManageEngine Desktop Central 10.1.2137.8之前版本存在安全漏洞,该漏洞源于软件向任何人公开已安装的服务器名称。内部主机名可以通过读取HTTP重定向响应来发现。
Description
Internal Hostname Disclosure Vulnerability
Readme
# Zoho_CVE-2022-23779
Internal Hostname Disclosure Vulnerability

## Proof-of-Concept Exploit
#### Step 1: curl -ILk https://IP:port/themes
#### Step 2: Read the HTTP redirect response and anaylze the `Location` HTTP response header.

## [PoC]

![Zoho](https://user-images.githubusercontent.com/79006904/188228406-025208f1-ed23-4949-8bf0-9f5fcebfda6a.png)


#### Follow us 
#### [Vulnmachines Platform](https://www.vulnmachines.com)
#### [YouTube](https://www.youtube.com/c/vulnmachines)
#### [Twitter](https://www.twitter.com/vulnmachines)
#### [Facebook](https://www.facebook.com/vulnmachines)
#### [LinkedIn](https://www.linkedin.com/company/vulnmachines)
File Snapshot

[4.0K] /data/pocs/4bce7461a94963b72559e11008f670422c72d8be └── [ 659] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.