Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2009-0473 PoC — Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge URI重定向漏洞

Source
Associated Vulnerability
Title:Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge URI重定向漏洞 (CVE-2009-0473)
Description:Automation ControlLogix是Rockwell开发的工业自动化控制系统。 Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge模块中的web界面存在开放重定向漏洞。远程攻击者可以借助未明向量,重新定向用户到任意网站和进行钓鱼攻击。
Description
Simple script to exploit open redirection vulnerability in Rockwell ControlLogix 1756-ENBT/A
Readme
## Description
Simple script to exploit open redirection vulnerability in Rockwell ControlLogix 1756-ENBT/A.

## Vulnerability Details
https://www.cvedetails.com/cve/CVE-2009-0473/

## Requirements
* Python 2.7
* You must be running an X Windows environment before executing this script.
* It will use Python’s “webbrowser” library to open the site using the default browser.
File Snapshot

[4.0K] /data/pocs/ddea3de3dec8b0bd105be754cb907ce9c0b5c68e ├── [ 873] cve-2009-0473.py ├── [ 11K] LICENSE └── [ 382] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.