Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24637 PoC — Open Web Analytics Server 安全漏洞

Source
Associated Vulnerability
Title:Open Web Analytics Server 安全漏洞 (CVE-2022-24637)
Description:Open Web Analytics Server是用于Google Analytics 等商业 Web 分析工具的开源替代方案。 Open Web Analytics 1.7.4版本存在安全漏洞,该漏洞源于使用 php 生成的文件(而不是预期的 php 序列)不是由 PHP 解释器处理的。未经身份验证的攻击者可以通过缓冲哈希利用该漏洞获取敏感用户信息和管理员权限。
Description
Open Web Analytics 1.7.3 - Remote Code Execution Exploit v2
Readme
# CVE-2022-24637
Open Web Analytics 1.7.3 - Remote Code Execution Exploit v2

Working exploit for [Open Web Analytics 1.7.3 - RCE](https://www.rapid7.com/db/modules/exploit/multi/http/open_web_analytics_rce/) enhenced with pentestmonkey's [php reverse shell](https://github.com/pentestmonkey/php-reverse-shell), Fixed issue of not able to find user in cache.

Original soruce exploit can be found on [here](https://www.exploit-db.com/exploits/51026)


## Usage
Add your attacker machine's IP and PORT in `php-reverse-shell.php` file and run the `exploit.py` with argument `-u` for vulnerable target url.

```bash
python3 exploit.py -u https://target.host/owa/
```

### Credits
@JacobEbben

@pentestmonkey
File Snapshot

[4.0K] /data/pocs/77a5a84911ea48523143bf068597f7cc2ba5f212 ├── [8.7K] exploit.py ├── [5.4K] php-reverse-shell.php └── [ 704] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.