Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-28987 PoC — SolarWinds Web Help Desk 信任管理问题漏洞

Source
Associated Vulnerability
Title:SolarWinds Web Help Desk 信任管理问题漏洞 (CVE-2024-28987)
Description:SolarWinds Web Help Desk是美国SolarWinds公司的一套服务台和资产管理软件。该软件支持集中式知识库、IT资产管理、项目和任务管理等功能。 SolarWinds Web Help Desk存在信任管理问题漏洞,该漏洞源于受到硬编码凭证漏洞的影响,允许远程未经身份验证的用户访问内部功能并修改数据。
Description
Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability
Readme
# CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability
Proof of concept to exploit CVE-2024-28987 on vulnerable servers.

## Blog Post
Root cause and indicators of compromise here:
[https://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive](https://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive)

## Usage
```
% python3 CVE-2024-28987.py -h
usage: CVE-2024-28987.py [-h] -u URL

options:
  -h, --help         show this help message and exit
  -u URL, --url URL  The URL of the target 
```

![Example](CVE-2024-28987.png)

## Follow the Horizon3.ai Attack Team on Twitter for the latest security research:
*  [Horizon3 Attack Team](https://twitter.com/Horizon3Attack)
*  [James Horseman](https://twitter.com/JamesHorseman2)
*  [Zach Hanley](https://twitter.com/hacks_zach)

## Disclaimer
This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.
File Snapshot

[4.0K] /data/pocs/94879eb030e9b0b587ab121754e843bb3b1cefd9 ├── [142K] CVE-2024-28987.png ├── [ 847] CVE-2024-28987.py └── [1.2K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.