Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-6308 PoC — SAP 多款产品代码问题漏洞

Source
Associated Vulnerability
Title:SAP 多款产品代码问题漏洞 (CVE-2020-6308)
Description:SAP BusinessObjects Business Intelligence Platform是德国思爱普(SAP)公司的一套商务智能软件和企业绩效解决方案套件。该产品具有报告生成、分析、数据可视化等功能。 SAP 存在安全漏洞,目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
Description
Exploit script for SAP Business Objects SSRF
Readme
# CVE-2020-6308
Exploit script for SAP Business Objects SSRF

This is a simple Golang script to automate the exploitation of CVE-2020-6308. The original Github repo did not show any automation (https://github.com/InitRoot/CVE-2020-6308-PoC , thanks @InitRoot), so this was made in an effort to help pentesters/red teamers to provide a proof of concept to clients. 

Warning: During the engagement this was created for, the specific webserver responded only after 10 seconds when a port was open. This specific parameter could change. If this is the case, only change the if condition in line 35.

Process could not be multithreaded due to the webserver only handling one request at a time and no accepting of a new request until first request is done. 
File Snapshot

[4.0K] /data/pocs/576baae39498ea4480017c8a0dd5527f52c58502 ├── [ 753] README.md └── [3.4K] SAP-Objects-SSRF.go 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.