Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-4323 PoC — Fluent Bit 安全漏洞

Source
Associated Vulnerability
Title:Fluent Bit 安全漏洞 (CVE-2024-4323)
Description:Fluent Bit是一款使用C语言编写的开源日志处理和分析系统。 Fluent Bit 2.0.7 到 3.0.3版本存在安全漏洞,该漏洞源于 http 服务器对跟踪请求的解析存在安全问题,可能导致拒绝服务条件、信息泄露或远程代码执行。
Description
This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution.
Readme
# CVE-2024-4323-Exploit-POC

This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution.

CVE-2024-4323 is a memory corruption vulnerability in Fluent Bit versions 2.0.7 through 3.0.3. The issue resides in the embedded HTTP server's parsing of trace requests, which can lead to denial of service (DoS) conditions, information disclosure, or remote code execution (RCE) ([MITRE CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4323)) ([Launchpad](https://bugs.launchpad.net/bugs/cve/2024-4323)).

For more details on the vulnerability and mitigations, you can refer to the [CVE-2024-4323 entry on Mitre](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4323) and [Tenable's advisory](https://tenable.com/security/research/tra-2024-17).

## Disclaimer

This script is intended for testing and educational purposes only. Unauthorized exploitation of vulnerabilities is illegal and unethical. Always obtain proper authorization before testing any system for vulnerabilities.

## Usage

Running the script with `-h` or `--help` will display the usage menu:

```
usage: exploit.py [-h] -u URL -p PORT -c CODE

Exploit for CVE-2024-4323

optional arguments:
  -h, --help            show this help message and exit
  -u URL, --url URL     Target URL
  -p PORT, --port PORT  Target port number
  -c CODE, --code CODE  Remote code to be executed
```
File Snapshot

[4.0K] /data/pocs/855e2d6fb8aeb6eee3d22dc8a5b80ff927af6472 ├── [1.2K] poc.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.