POC详情: f95deb557f16e4dc1d03891e46019e3e68e467f4

来源
关联漏洞
标题: Metabase 安全漏洞 (CVE-2023-38646)
描述:Metabase是美国Metabase公司的一个开源数据分析平台。 Metabase 0.46.6.1之前版本和Metabase Enterprise 1.46.6.1之前版本存在安全漏洞,该漏洞源于允许攻击者以运行该服务的权限在服务器上执行任意命令。
描述
Remote Code Execution on Metabase CVE-2023-38646
介绍
# 🛡️ Exploit for CVE-2023-38646 🛡️

Welcome to this powerful exploit tool! It's designed specifically to test for the CVE-2023-38646 vulnerability in Metabase servers.

## 🚀 Installation 🚀

The journey begins with Python 3 and pip. Install them with the following command:

```bash
sudo apt-get install python3 python3-pip
```

Next, take off with the Python dependencies. Just run the following command:

```bash
pip3 install -r requirements.txt
```

## 🛠️ Usage 🛠️

This tool offers flexibility - test either a single URL or a file containing a list of URLs.

### Testing a single URL 🎯

To scrutinize a single URL, use the `-u` or `--url` option. Feed it the base URL of the server you're aiming at.

Example:

```bash
python3 exploit.py -u https://example.com
```

### Testing a list of URLs 📝

To assess a list of URLs, place all the URLs in a file, one URL per line. Then, use the `-l` or `--list` option and provide the file containing the list of URLs to test.

Example:

```bash
python3 exploit.py -l urls.txt
```

### Additional Options 🎛️

- `-v` or `--verbose`: Unleash detailed output for each step of the process.
- `-t` or `--threads`: Specify the number of threads for the scan. By default, it zips along with 100.
- `-o` or `--output`: Designate the file to save those URLs vulnerable to the exploit.

## ⚠️ Warning ⚠️

This tool is for educational and testing purposes ONLY. Unauthorized attacks on servers are illegal. The creator of this tool disclaims any damage that may occur due to its misuse.

To install dependencies:

```bash
pip install -r requirements.txt
```
Remember to code responsibly and happy testing! 🚀🔒🌐

文件快照

[4.0K] /data/pocs/f95deb557f16e4dc1d03891e46019e3e68e467f4 ├── [5.6K] exploit.py ├── [1.7K] README.md └── [ 75] requirements.txt 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。