支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 789ccd9568379c83b5b74fd7aa1d05207fb82689

来源
关联漏洞
标题:Splunk 安全漏洞 (CVE-2023-32707)
Description:Splunk是美国Splunk公司的一套数据收集分析软件。该软件主要用于收集、索引和分析及其所产生的数据,包括所有IT系统和基础结构(物理、虚拟机和云)生成的数据。 Splunk Enterprise和Splunk Cloud Platform存在安全漏洞,该漏洞源于具有edit_user能力的低权限用户可以通过特制的web请求将其特权授予管理员用户。受影响的产品和版本:Splunk Enterprise 9.0.5之前版本,8.2.11版本, 8.1.14版本;Splunk Cloud Platform
Description
An improved POC exploit based on the reported CVE on exploitdb
介绍
# CVE-2023-32707
An improved POC exploit based on the reported CVE on [exploitdb](https://www.exploit-db.com/exploits/51747)

Exploit Title: Splunk 9.0.5 - Admin Account Takeover
CVE: CVE-2023-32707

## Overview

This script allows for exploiting a vulnerability in Splunk 9.0.5, leading to admin account takeover. The exploit leverages a low-privilege user with the `edit_user` capability to escalate privileges.

## Prerequisites

- Python 3.x
- Required Python packages (install using `pip3 install -r requirements.txt`):
  - requests
  - urllib3

## Usage

1. Clone the repository:

    ```bash
    git clone https://github.com/9xN/CVE-2023-32707.git
    cd CVE-2023-32707
    ```

2. Run the script with the required parameters:

    ```bash
    python3 exploit.py --host <splunk_host> --username <splunk_username> --password <splunk_password> --target-user <target_user> --force-exploit
    ```

    Replace `<splunk_host>`, `<splunk_username>`, `<splunk_password>`, and `<target_user>` with your Splunk server details.

## Command-line Options

- `--host`: Splunk host or IP address (required)
- `--username`: Splunk username (required)
- `--password`: Splunk password (required)
- `--target-user`: Target user for account takeover (required)
- `--force-exploit`: Force the exploit (optional)
- `--proxy-file`: File containing proxy settings (optional)

## Proxies

To use proxies, specify the `--proxy-file` with the path to a file containing proxy settings.

Example:

```bash
python3 exploit.py --host <splunk_host> --username <splunk_username> --password <splunk_password> --target-user <target_user> --force-exploit --proxy-file proxies.txt
```
文件快照

[4.0K] /data/pocs/789ccd9568379c83b5b74fd7aa1d05207fb82689 ├── [6.5K] exploit.py ├── [ 34K] LICENSE ├── [ 73] proxies.txt ├── [1.6K] README.md └── [ 16] requirements.txt 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。