Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-0830 PoC — EasyNAS 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:EasyNAS 操作系统命令注入漏洞 (CVE-2023-0830)
Description:EasyNAS是EasyNAS开源的一个用于家庭或小型办公室的存储管理系统。 EasyNAS 1.1.0版本存在操作系统命令注入漏洞,该漏洞源于文件/backup.pl的功能系统存在问题,会导致操作系统命令注入。
Readme
# CVE-2023-0830: EasyNAS 1.1.0 Authenticated OS Command Injection Exploit

This Python script is a powerful exploit for EasyNAS version 1.1.0. The vulnerability exploited is a command injection flaw, which requires authentication.

The script begins by establishing a session with the target server, then sends a login request with user-provided credentials. Upon successful authentication, the script constructs a payload that, when executed, opens a reverse shell connection to a user-specified IP and port. This payload is URL and Base64 encoded and then injected into the `backup.pl` file on the server via a crafted GET request.

This script is meant to be a proof of concept, and should only be used responsibly and ethically.

## CVE: CVE-2023-0830

## Exploit Author
Ivan Spiridonov (ivanspiridonov@gmail.com)
 [https://xbz0n.medium.com](https://xbz0n.medium.com)

## Vendor home page 
[https://www.easynas.org](https://www.easynas.org)

## Usage
```python
./exploit.py http(s)://url username password listenerIP listenerPort
```

## Dependencies
Requires Python3 and the Requests library.

### Note:
Disable the insecure request warnings when using this script, as it will attempt to establish an HTTPS connection to the target URL.

## Disclaimer
This script is for educational purposes and authorized penetration testing only. Always seek explicit permission before running any penetration tests against a network or system.

Please use responsibly.
File Snapshot

[4.0K] /data/pocs/5a3f75c34cd9d66d39aeeda4ef4e859c4eabffab ├── [2.1K] CVE-2023-0830.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.