Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-8021 PoC — Apache Superset 安全漏洞

Source
Associated Vulnerability
Title:Apache Superset 安全漏洞 (CVE-2018-8021)
Description:Apache Superset是美国阿帕奇(Apache)软件基金会的一款企业级商业智能Web应用程序。该程序包括互数据可视化和企业级身份验证等功能。 Apache Superset 0.23之前的版本中存在安全漏洞,该漏洞原因程序使用不安全的加载方法。远程攻击者可利用该漏洞执行任意代码。
Description
CVE-2018-8021 Proof-Of-Concept and Exploit 
Readme
# Apache Superset pickle library code execution
IBM : Apache Superset could allow a remote attacker to execute arbitrary code on the system, caused by the use of unsafe load method from the pickle library to deserialize data. By sending specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
# Refs : 
 - https://github.com/apache/incubator-superset/pull/4243
 - https://nvd.nist.gov/vuln/detail/CVE-2018-8021
 - https://exchange.xforce.ibmcloud.com/vulnerabilities/152702
 
# Usage : 

    usage: exploit.py [-h] -t TCP -tp TPORT -i IP -p PORT -U USER -P PASSW

    optional arguments:
      -h, --help            show this help message and exit
      -t TCP, --tcp TCP     tcp ip for shell
      -tp TPORT, --tport TPORT
                            tcp port for shell
      -i IP, --ip IP        ip
      -p PORT, --port PORT  port
      -U USER, --user USER  User belong to Superset 
      -P PASSW, --passw PASSW
                            password of the user !
                            
__Note  :  User and Pass Must belong to a user that can import Dashboards on Superset!!!__
# Creadits 
Please Note Original PoC has been written by _David May_ [david.may@semanticbits.com][https://github.com/DavidMay121] 
File Snapshot

[4.0K] /data/pocs/7a8617f553651dff9075f00387c58f3b4baef63c ├── [3.4K] exploit.py ├── [ 34K] LICENSE └── [1.2K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.