POC详情: 51d8ec7a4bfe4de64d3081fefa5415c1335397cd

来源
关联漏洞
标题: Aruba Networks ArubaOS 安全漏洞 (CVE-2024-26304)
描述:Aruba Networks ArubaOS是美国安移通(Aruba Networks)公司的一套面向Aruba Mobility-Defined Networks(包括移动控制器和移动接入交换机)的操作系统。 Aruba Networks ArubaOS存在安全漏洞,该漏洞源于底层 L2/L3 Management服务中存在缓冲区溢出,可能会通过 PAPI UDP 端口 (8211) 发送特制数据包,导致未经身份验证的远程代码执行。
描述
CVE-2024-26304 is a critical vulnerability (CVSS score of 9.8) affecting ArubaOS
介绍
# CVE-2024-26304 - Remote Code Execution Vulnerability in ArubaOS

## Overview

**CVE-2024-26304** is a critical remote code execution (RCE) vulnerability affecting **ArubaOS** due to a buffer overflow in its L2/L3 Management service. An attacker can exploit this by sending specially crafted packets to the **PAPI** (Process Application Programming Interface) UDP port **8211**, resulting in the execution of arbitrary code with elevated privileges.

### CVSS Score: 9.8 (Critical)
- **Attack Vector**: Network
- **Attack Complexity**: Low
- **Privileges Required**: None
- **User Interaction**: None
- **Confidentiality Impact**: High
- **Integrity Impact**: High
- **Availability Impact**: High

## Affected Products

- ArubaOS systems with vulnerable versions
- Systems using the **PAPI UDP port 8211**

Refer to [Aruba's official advisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt) for details on affected versions.

## Exploitation

An unauthenticated remote attacker can exploit this vulnerability by sending malicious packets to the PAPI UDP port. Successful exploitation results in arbitrary code execution, enabling the attacker to take complete control over the device.

### Proof-of-Concept (PoC)

A proof-of-concept exploit is available for this vulnerability. The exploit script `CVE-2024-26304.py` demonstrates how an attacker can leverage the vulnerability to execute code on the target system.

## How to Use the Exploit Tool

The tool `CVE-2024-26304.py` is a proof-of-concept exploit script designed to demonstrate this vulnerability. Here’s how to run it:

### Prerequisites

- Python 3.x
- Required Python libraries (if any, listed in `requirements.txt`)

## Parameters
- target: The IP address of the vulnerable ArubaOS device.
- port: (Optional) The PAPI UDP port (default: 8211).

### Usage

1. Clone the repository:
   ```bash
   git clone https://github.com/your-repo/CVE-2024-26304
   cd CVE-2024-26304
   pip install -r requirements.txt
   python CVE-2024-26304.py --target <target_ip> --port 8211

## Disclaimer
This tool is intended for educational purposes and penetration testing within environments where you have explicit permission. Misuse of this tool can result in criminal charges or fines. The authors are not responsible for any misuse.
文件快照

[4.0K] /data/pocs/51d8ec7a4bfe4de64d3081fefa5415c1335397cd ├── [6.1K] CVE-2024-26304.py ├── [2.2K] README.md └── [ 37] requirements.txt 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。