Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-33831 PoC — FUXA 命令注入漏洞

Source
Associated Vulnerability
Title:FUXA 命令注入漏洞 (CVE-2023-33831)
Description:FUXA是一个开源的基于网络的过程可视化(SCADA/HMI/Dashboard)软件。 FUXA 1.1.13版本存在安全漏洞,该漏洞源于/api/runscript端点中存在远程命令执行(RCE)漏洞。攻击者可利用该漏洞通过设计POST请求执行任意命令。
Description
Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.
Readme
# Unauthenticated-RCE-FUXA-CVE-2023-33831
The vulnerability affects FUXA's scripting component, due to lack of control or sanitization on inputs that can be controlled by users, thus allowing the use of dangerous methods that can be scaled for remote code execution.
The affected route is /api/runscript, where it is possible to execute commands without having to be authenticated through the code parameter via the POST method using the child_process module via the exec function.

<p align="center">
  <img height=300 src="https://github.com/rodolfomarianocy/Unauthenticated-RCE-FUXA-CVE-2023-33831/assets/54555784/07c1b06a-737d-4842-b47b-abdebffa3b5b" />
</p>

---

#### Mode of Use
```
python CVE-2023-33831.py --rhost <ip> --rport <rport> --lhost <lhost> --lport <lport>
```
Link: https://www.youtube.com/watch?v=Xxa6yRB2Fpw
File Snapshot

[4.0K] /data/pocs/6838d93ef2f267240f1615cf7a5e7a3bdd5ed318 ├── [1.9K] CVE-2023-33831.py └── [ 830] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.