Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-43040 PoC — Red Hat Ceph 安全漏洞

Source
Associated Vulnerability
Title:Red Hat Ceph 安全漏洞 (CVE-2023-43040)
Description:Red Hat Ceph是美国红帽(Red Hat)公司的一套Linux PB级分布式文件系统。该系统的主要目标是设计成基于POSIX(可移植操作系统接口)的没有单点故障的分布式文件系统,使数据能容错和无缝的复制。 Red Hat Ceph 存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
Description
CVE-2023-43040 PoC
Readme
# CVE-2023-43040

This repository contains a proof-of-concept exploit for the CVE-2023-43040 vulnerability found in RADOS Gateway (RADOSGW). This vulnerability allows attackers to upload objects to any bucket accessible by the specified access key, potentially leading to unauthorized data manipulation or exfiltration.

```shell
$ pip install -r requirements.txt
$ python CVE-2023-43040.py --access_key 699GVXAYVZ5A3ZRYSCI0 --secret_key UZAHHNF3WzASPKCnDdQ8rCvAKaBvLlkZI2V8n7We --endpoint http://127.0.0.1:8080
```

<img src="https://github.com/riza/CVE-2023-43040/blob/main/CVE-2023-43040.jpg?raw=true" />

## References

* [CVE-2023-43040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43040)
* [quincy: [CVE-2023-43040] rgw: Fix bucket validation against POST policies](https://github.com/ceph/ceph/pull/53757)

## Disclaimer
This repository is for educational purposes only. The information and code provided herein are meant to demonstrate the vulnerability and are not intended for malicious use. The author is not responsible for any misuse of the provided code. Use this information responsibly and only in environments where you have explicit permission to test and secure systems. Unauthorized use of this information or code may be illegal and unethical.

## Author
* [Rıza Sabuncu](https://twitter.com/rizasabuncu)
File Snapshot

[4.0K] /data/pocs/52f7347434ab9d6f71d817479b21f86b5c5a99b6 ├── [176K] CVE-2023-43040.jpg ├── [5.7K] CVE-2023-43040.py ├── [1.3K] README.md └── [ 65] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.