Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15227 PoC — Nette 代码注入漏洞

Source
Associated Vulnerability
Title:Nette 代码注入漏洞 (CVE-2020-15227)
Description:Nette是个人开发者的一个基于组件的事件驱动 PHP 框架。 Nette 存在代码注入漏洞,该漏洞源于外部输入数据构造代码段的过程中,网络系统或产品未正确过滤其中的特殊元素。攻击者可利用该漏洞生成非法的代码段,修改网络系统或组件的预期的执行控制流。以下产品及版本受到影响:2.0.19版本, 2.1.13版本, 2.2.10版本, 2.3.14版本, 2.4.16版本, 3.0.6版本。
Description
CVE-2020-15227 exploit
Readme
CVE-2020-15227
==============

DISCLAIMER! I take no responsibility of using it in wild life environment so please do NOT do it. This thingy is just to demonstrate and for test things for sysadmins

I made this exploit according to publishing a CVE of David Grudl (The founder of Nette foundation)

As a security researcher I developed a little monster (for educational and demonstrational purposes of course and for ethical reasons I've made autofixer too)

The security vulnerability exploits callback parameter in nette.micro. We have no idea why the crap that exists (possible backdoor feature?)

Exploit is trying to get reverse shell from the victim server. The URL is hardcoded here so no stress about exploit edits.

PRs are welcomed!
File Snapshot

[4.0K] /data/pocs/8112939a4d34064b95acef167a66a7fa0cee1ae9 ├── [1.1K] autofixer-CVE-2020-15227.py ├── [2.2K] exploit-CVE-2020-15227.py └── [ 743] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.