Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-51378 PoC — CyberPanel 安全漏洞

Source
Associated Vulnerability
Title:CyberPanel 安全漏洞 (CVE-2024-51378)
Description:CyberPanel是Usman Nasir个人开发者的一款内置了DNS和电子邮件服务器的虚拟主机控制面板。 CyberPanel存在安全漏洞,该漏洞源于dns/views.py 中的 getresetstatus 允许远程攻击者绕过身份验证并通过 /ftp/getresetstatus 执行任意命令。
Description
A Python script to scan websites for the CVE-2024-51378 vulnerability.
Readme
# CVE-2024-51378 Vulnerability Scanner
![Screenshot](https://i.imgur.com/EN1pvZF.png)
A Python script to scan websites for the CVE-2024-51378 vulnerability.

## Features
- Identifies vulnerable sites based on CSRF tokens and custom endpoints.
- Highlights results as `[GOOD]` or `[SAFE]` with color-coded outputs.
- Logs detailed scan results to a file.
- Displays ASCII art with project details.

## Requirements
- Python 3.6+
- Required libraries:
  - `httpx`
  - `pyfiglet`

## Installation
1. Clone the repository:
   git clone https://github.com/i0x29A/CVE-2024-51378.git
   cd CVE-2024-51378

2. Install dependencies:
   pip install -r requirements.txt

## Usage
1. Prepare a file containing URLs to scan (one per line).

2. Run the script:
   python3 scanner.py <file> <output>
   - `<file>`: Path to the file with URLs.
   - `<output>`: Path to save the log file.

### Example
File `targets.txt`:
http://example.com
http://testsite.org

Run the scanner:
python3 scanner.py targets.txt results.log

## Notes
- Use responsibly! This tool is for educational and testing purposes only.
- Ensure compliance with all applicable laws and policies when using the scanner.

## License
This project is licensed under the MIT License. See the [LICENSE](LICENSE) file for details.

## Authors
- [@Luka Petrovic](https://github.com/refr4g)
- [@cr4shed](https://github.com/i0x29A)
File Snapshot

[4.0K] /data/pocs/fffdce51365432fc7348ca46bfb58ae6e23515c8 ├── [3.2K] CVE-2024-51378.py ├── [1.0K] LICENSE ├── [1.3K] README.md └── [ 15] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.