Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-35914 PoC — GLPI 注入漏洞

Source
Associated Vulnerability
Title:GLPI 注入漏洞 (CVE-2022-35914)
Description:GLPI是个人开发者的一款开源IT和资产管理软件。该软件提供功能全面的IT资源管理接口,你可以用它来建立数据库全面管理IT的电脑,显示器,服务器,打印机,网络设备,电话,甚至硒鼓和墨盒等。 GLPI 10.0.2及之前版本存在安全漏洞,该漏洞源于htmlawed 模块中的 /vendor/htmlawed/htmlawed/htmLawedTest.php 允许 PHP 代码注入。
Description
Script in Ruby for the CVE-2022-35914 - RCE in GLPI 
Readme
Script in Ruby for the CVE-2022-35914 - RCE in GLPI 

<h1 align="center">
  <br>
  # CVE-2022-35914
 
  <br>
  
  <br>
  <img src="https://user-images.githubusercontent.com/115858996/223286025-9c2bf0a3-62ad-45c8-89b8-36f347b1954d.png">
  <br>  
</h1>

Just add the Target to the Script.

<b>Usage:</b>
```bash
ruby.exe exploit.rb
=> whoami
```

<b>You can close with:</b>
```bash
=> exit
```
File Snapshot

[4.0K] /data/pocs/baee8efca4c89196e4bf5229596274588dc071c2 ├── [1.1K] exploit.rb └── [ 392] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.