POC详情: 7ea0cac15809083dcd984efe638ad0beba56bc2e

来源
关联漏洞
标题: Adobe ColdFusion 访问控制错误漏洞 (CVE-2024-20767)
描述:Adobe ColdFusion是美国奥多比(Adobe)公司的一套快速应用程序开发平台。该平台包括集成开发环境和脚本语言。 Adobe ColdFusion 2023.6, 2021.12 版本及之前版本存在访问控制错误漏洞,该漏洞源于存在不正确的访问控制漏洞,可能导致任意文件系统读取。
描述
Proof of Concept for CVE-2024-20767. Arbitrary file read from Adobe ColdFusion 
介绍
# Proof of Concept script for CVE-2024-20767 

## Overview
`get-the-files.py` is a Python script that exploits a vulnerability in Adobe ColdFusion Servers (CVE-2024-20767) to read files from the server. The script is based on a method outlined at https://jeva.cc/2973.html.

## Disclaimer
This script is provided for educational purposes only. Unauthorized testing of servers, exploiting vulnerabilities without permission, and accessing or disclosing private data without consent are illegal and unethical activities. By using this script, you agree to do so within the bounds of the law and ethical guidelines. The author or contributors are not responsible for any misuse or damage caused by this script.

## Prerequisites
+ Python 3.x
+ `requests` library

## Installation

Before running the script, ensure you have Python 3.x installed on your system. You can download Python from the official website: https://www.python.org/downloads/.

To install the required requests library, run the following command:

```pip install requests```

## Usage

The script can be executed from the command line by providing the necessary arguments.

```
python get-the-files.py --endpoints <URLs> --port <PORT> --command <FILE_PATH>
``` 

Arguments
+ -e or --endpoints: Target Adobe ColdFusion Server URL(s). This argument is required and can accept multiple URLs separated by spaces.
+ -p or --port: Target server port. This argument is optional and defaults to 8500 if not provided.
+ -c or --command: The file path to read from the server. This argument is required.

### Example
```
python get-the-files.py --endpoints example.com another-example.com --port 8500 --command "/etc/passwd"
``` 

## Affected versions
ColdFusion servers with the Performance Monitoring Toolset enabled (and accessible via /pms) running the following versions are vulnerable:
+ ColdFusion 2023.6
+ ColdFusion 2021.12
+ Earlier versions

## License
This script is released under the MIT License. See the LICENSE file for more details.

## Contact
For any questions or concerns regarding this script, please open an issue on the GitHub repository.
文件快照

[4.0K] /data/pocs/7ea0cac15809083dcd984efe638ad0beba56bc2e ├── [2.1K] get-the-files.py └── [2.1K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。