关联漏洞
标题:
Apache OFBiz 代码问题漏洞
(CVE-2023-51467)
描述:Apache OFBiz是美国阿帕奇(Apache)基金会的一套企业资源计划(ERP)系统。该系统提供了一整套基于Java的Web应用程序组件和工具。 Apache OFBiz 18.12.11之前版本存在代码问题漏洞,该漏洞源于允许攻击者绕过身份验证来实现服务器端请求伪造。
描述
Apache OfBiz Auth Bypass Scanner for CVE-2023-51467
介绍
# CVE-2023-51467 Scanner 🕵️♂️
## Description 📜
CVE-2023-51467 Scanner is a Python-based command-line tool 🛠️ that scans URLs for a specific vulnerability in the Apache OfBiz ERP system. This zero-day security flaw, tracked as CVE-2023-51467, allows attackers to bypass authentication protections due to an incomplete patch for the critical vulnerability CVE-2023-49070.
## Vulnerability Details 🔐
The CVE-2023-51467 vulnerability resides in the login functionality of Apache OfBiz versions prior to 18.12.10. It can be exploited by sending an HTTP request with empty or invalid USERNAME and PASSWORD parameters, which results in an authentication success message, allowing unauthorized access to internal resources.
## Installation 💻
To use the CVE-2023-51467 Scanner, you need Python 3.x.
You can install the required packages using `pip` 📦:
```shell
pip install -r requirements.txt
```
## Usage 🚀
To scan a single URL 🎯:
```shell
python exploit.py -u http://example.com
```
To scan a list of URLs from a file 📊:
```shell
python exploit.py -f urls.txt -o output.txt -t 50
```
## Options ⚙️
- `-u`, `--url`: Single URL to send the GET request to 🌐.
- `-f`, `--file`: File containing a list of base URLs to scan 📄.
- `-o`, `--output`: File to write vulnerable systems to (default is `output.txt`) 📝.
- `-t`, `--threads`: Number of concurrent threads to use (default is 10) 🧵.
## Disclaimer ⚠️
This tool is intended for security research and should not be used for illegal activities. The authors of this tool cannot be held responsible for any misuse or damage from its use.
文件快照
[4.0K] /data/pocs/57badc0e7e5c43c0d00502b9cf462116fadd7738
├── [3.9K] exploit.py
├── [1.6K] README.md
└── [ 52] requirements.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。