关联漏洞
标题:
Samba MS-RPC Shell命令注入漏洞
(CVE-2007-2447)
描述:Samba是Samba团队开发的一套可使UNIX系列的操作系统与微软Windows操作系统的SMB/CIFS网络协议做连结的自由软件。该软件支持共享打印机、互相传输资料文件等。 Samba在处理用户数据时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上执行任意命令。 Samba中负责在SAM数据库更新用户口令的代码未经过滤便将用户输入传输给了/bin/sh。如果在调用smb.conf中定义的外部脚本时,通过对/bin/sh的MS-RPC调用提交了恶意输入的话,就可能允许攻击者以nobody用户的权限执
描述
CVE-2007-2447 - Samba usermap script
介绍
# CVE-2007-2447
CVE-2007-2447 - Samba usermap script.
</br>
https://alien0ne.digitalpress.blog/cve-2007-2447/
<br />
## Usage:
<br />
```shell
$ python3 script.py <rhost> <rport> <lhost> <lport>
```
- `rhost` -> The target address
- `rport` -> The target port
- `lhost` -> The listener address
- `lport` -> The listener port
<br /><br />
## Installation:
- This exploit requires Python 3.7 or higher
sudo apt-get -y install python3-pip
pip3 install pysmb
https://github.com/Alien0ne/CVE-2007-2447
## PoC:
<br />

<br />
## Disclaimer:
\
All the code provided on this repository is for educational/research purposes only. Any actions or activities related to the material contained within this repository is solely your responsibility. The misuse of the code in this repository can result in criminal charges brought against the persons in question. Author will not be held responsible in the event any criminal charges be brought against any individuals misusing the code in this repository to break the law.
文件快照
[4.0K] /data/pocs/791eb259628e7f33741e2d0c5616f8e3571a2566
├── [1.9K] exploit.py
├── [111K] PoC.png
└── [1.0K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。