关联漏洞
描述
This Python script checks for the presence of CVE-2024-40898, a critical vulnerability in Apache HTTP Server that may allow SSL/TLS certificate verification bypass under certain misconfigurations. It initiates an SSL connection to the target server and sends a HEAD request.
介绍
# CVE-2024-40898
This Python script checks for the presence of CVE-2024-40898, a critical vulnerability in Apache HTTP Server that may allow SSL/TLS certificate verification bypass under certain misconfigurations. It initiates an SSL connection to the target server and sends a HEAD request.
It initiates an SSL connection to the target server and sends a HEAD request. If the response suggests that SSL certificate verification is improperly handled, the server might be vulnerable.
🚀 Features
✅ Supports full URLs or plain IPs with optional ports
✅ Automatically parses and defaults to port 443 if not specified
✅ Ignores SSL certificate errors (for test purposes)
✅ Minimal and fast detection logic
✅ Clear output indicating possible vulnerability
🛠 Usage
python CVE-2024-40898.py -u https://192.168.1.1:443
You can also just pass an IP:
python CVE-2024-40898.py -u 192.168.1.1
⚠️ Disclaimer
This script is for educational and authorized security testing only. Do not use on systems you do not own or have explicit permission to test.
文件快照
[4.0K] /data/pocs/8af98b78ade06532c3d6e556e1862976daf002d9
├── [1.7K] CVE-2024-40898 .py
└── [1.0K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。