Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-37770 PoC — 14Finger 安全漏洞

Source
Associated Vulnerability
Title:14Finger 安全漏洞 (CVE-2024-37770)
Description:14Finger是b1ackc4t个人开发者的一个功能齐全的 Web 指纹识别和分享平台。 14Finger v1.1版本存在安全漏洞,该漏洞源于在指纹功能中包含远程命令执行(RCE)漏洞,允许攻击者通过精心设计的有效载荷执行任意命令。
Description
CVE-2024-37770
Readme
# CVE-2024-37770

## description
14Finger v1.1 was discovered to contain a remote command execution (RCE) vulnerability in the fingerprint function. This vulnerability allows attackers to execute arbitrary commands via a crafted payload.

## Attack Vector
Unauthenticated attackers can execute command injection through shell metacharacters, thereby RCE remote servers.

## Detail
There is an unauthorized remote command execution vulnerability at the fingerprint scanning point of the core function
![image](https://github.com/k3ppf0r/CVE-2024-37770/assets/63085409/82375a33-0c6a-4634-a917-610a92359499)

Through the audit source code, you can see that when only_spider is false, spider is true, you will execute the crawl_site() function
![image](https://github.com/k3ppf0r/CVE-2024-37770/assets/63085409/c6d42a1d-10c5-4613-bfeb-1d0b3f2ecb67)

Continue to follow up, find that the submitted URL will be stitched to CMD, handed over to the subprocess module of Python for execution, and arbitrarily commands can be executed by constructing Payload.
![image](https://github.com/k3ppf0r/CVE-2024-37770/assets/63085409/e79919f3-9dd3-4b3d-a9d3-bd81a6a1883d)

Exploit:
![image](https://github.com/k3ppf0r/CVE-2024-37770/assets/63085409/d1264671-51d8-4473-8159-60afb5d0b60f)


The program is blocked, why? Because our command execution was successful!

![image](https://github.com/k3ppf0r/CVE-2024-37770/assets/63085409/5ae69370-a71c-4224-9d93-64c0c4c83378)

SUCCEED!
File Snapshot

[4.0K] /data/pocs/c5b271014e0b235fcedf5fee89133cb6ffb03909 └── [1.4K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.