POC详情: 6726be9e3b666b75e3e2a37dfb3e409f6dd3659c

来源
关联漏洞
标题: Adobe Magento 输入验证错误漏洞 (CVE-2022-24086)
描述:Adobe Magento是美国奥多比(Adobe)公司的一套开源的PHP电子商务系统。该系统提供权限管理、搜索引擎和支付网关等功能。 Adobe Magento 存在输入验证错误漏洞,该漏洞源于输入验证不当。攻击者可利用该漏洞向应用程序发送专门设计的请求,并在目标系统上执行任意代码。
介绍
# CVE-2022-24086-RCE
CVE-2022-24086 Exploitation tool written in Python 3 compatible with lists of URL/IPs. This download includes a list of over 334,300 potentially vulnerable hosts according to shodan.io and personal scans.
This tool is NOT free to prevent abuse. As of now patches are being applied but the majority of systems aren't patched.

**We put up 4 limited copies for sale, available at: https://satoshidisk.com/pay/CEtVaB**

## Requirements
> sudo apt-get install python3 python3-pip
>
> pip3 install requests

![Magento](https://user-images.githubusercontent.com/101390984/158311160-0c60d4d7-7f28-403f-bf2f-8a06045c9fc0.png)
## Statistics
[CVE-2022-24086](https://www.cvedetails.com/cve/CVE-2022-24086/) vulnerability scores a 10 out of 10 on severity scale. In this kit we included a scan of ours coupled with results from SHODAN.IO into a list of over 334,300 hosts that may be vulnerable.

文件快照

[4.0K] /data/pocs/6726be9e3b666b75e3e2a37dfb3e409f6dd3659c └── [ 907] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。