Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-3640 PoC — Rockwell Automation FactoryTalk Remote Access 安全漏洞

Source
Associated Vulnerability
Title:Rockwell Automation FactoryTalk Remote Access 安全漏洞 (CVE-2024-3640)
Description:Rockwell Automation FactoryTalk Remote Access是美国罗克韦尔(Rockwell Automation)公司的一种解决方案,它允许用户从任何位置安全地访问、监控和控制他们的工业自动化设备和系统。 Rockwell Automation FactoryTalk Remote Access存在安全漏洞,该漏洞源于存在未加引号的可执行路径,可能会导致远程代码执行。
Description
CVE-2024-3640绕过Waf进行漏洞利用
Readme
CVE-2024-3640 WafBypass woodpacker插件利用
绕过方式其实就是插入xml注释符进行关键字绕过。

延时检测
![image](https://github.com/user-attachments/assets/7d55d3e0-b3c9-4a0b-a457-28b51fa7af29)

回显命令执行
![image](https://github.com/user-attachments/assets/34fac943-cf8b-49f9-a79e-29d6733f6895)

自定义内存马
![image](https://github.com/user-attachments/assets/757ac07d-53a7-4b77-b6d3-070805af20bf)

File Snapshot

[4.0K] /data/pocs/e7f4ac7bf1bed90ace30e32caed8bd22dfe805e6 ├── [1.4K] pom.xml ├── [ 439] README.md └── [4.0K] src └── [4.0K] main └── [4.0K] java └── [4.0K] me └── [4.0K] gv7 └── [4.0K] woodpecker └── [4.0K] plugin ├── [4.0K] exploit │   └── [ 28K] GeoserverlRceExp.java ├── [1.5K] GeoserverVulPlugin.java ├── [4.0K] pocs │   └── [3.7K] GeoserverlRcePoc.java └── [ 375] WoodpeckerPluginManager.java 9 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.