关联漏洞
描述
Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability
介绍
# CVE-2024-28987
Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability
# Overview
- Extracts up to 25 most recent tickets (API limitation)
- Retrieves full details for each ticket
- Analyzes ticket IDs to estimate total tickets in system
- Organizes output in a structured directory format
## Reasoning
This builds on other exploits for this vuln. Other exploits (like MSFconsole) would trunkate output, and I wanted to see the entirety of ALL tickets.
# Usage
``` bash
python3 solar_exploit.py -u https://target.com [-o output_directory] [-d delay_seconds]
```
# Legal Disclaimer
This tool is provided for EDUCATIONAL PURPOSES ONLY. The author accepts no liability for any misuse of this software. Users must:
Only use against systems they own or have explicit written permission to test
Follow all applicable laws and regulations
Understand that unauthorized access to computer systems is illegal
By using this tool, you take full responsibility for your actions. The author cannot be held responsible for any damages resulting from its use.
文件快照
[4.0K] /data/pocs/7ce412c55f7c1e6e078fb24ffe599f27c1680231
├── [5.4K] cve-2024-28987.py
├── [1.0K] LICENSE
└── [1.1K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。