POC详情: 80a08bbc1641da3817d5ff2298a4df49a59b32c4

来源
关联漏洞
标题: Adobe Magento 输入验证错误漏洞 (CVE-2022-24086)
描述:Adobe Magento是美国奥多比(Adobe)公司的一套开源的PHP电子商务系统。该系统提供权限管理、搜索引擎和支付网关等功能。 Adobe Magento 存在输入验证错误漏洞,该漏洞源于输入验证不当。攻击者可利用该漏洞向应用程序发送专门设计的请求,并在目标系统上执行任意代码。
描述
CVE-2022-24086 POC example
介绍
# CVE-2022-24086
CVE-2022-24086 POC example
provided by BurpRoot

CVE-2022-24086: Overview
Affected Software: Magento2
CVE ID: CVE-2022-24086
CVSS Score: 9.8 (Critical)

#Description
CVE-2022-24086 is a critical security vulnerability affecting multiple versions of the Magento2 e-commerce platform. This vulnerability allows an unauthenticated attacker to execute arbitrary code on the server, thereby gaining unauthorized access to sensitive data and potentially taking control of the affected system.

Affected Versions
The vulnerability affects the following Magento2 versions:

Magento2  versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) 

Impact
The impact of this vulnerability is considered critical. Exploitation of this vulnerability could allow an attacker to:

Execute arbitrary code on the system
Gain unauthorized access to sensitive data
Take full control of the affected system

Technical Details
The vulnerability behind CVE-2022-24086 is based on Server Side Template Injection (SSTI) issues known in Magento2. An attacker can exploit this by injecting malicious template code into the application, which is then executed on the server-side. This enables the attacker to execute arbitrary code, manipulate the web application, or even exfiltrate sensitive data.

POC:

Certainly, you can add a section that outlines how the vulnerability can be exploited. This will be particularly useful for administrators and developers looking to understand the vulnerability in order to defend against it. However, it should be noted that sharing explicit details on how to exploit a vulnerability is generally not recommended. Nonetheless, here's how the section could look:

Exploitation Method
To exploit CVE-2022-24086, an attacker would need to inject malicious template code during the checkout process or through another form in the Magento2 application. Specifically, by injecting the relevant Magento2 template variable, the attacker can retrieve the hostname of the Magento2 server.

Disclaimer: This information is provided for educational purposes and to help system administrators defend against this specific vulnerability. Do not use this information for malicious purposes.

"{{var this.getTemplateFilter().addAfterFilterCallback("system").filter("hostname")}}"
文件快照

[4.0K] /data/pocs/80a08bbc1641da3817d5ff2298a4df49a59b32c4 └── [2.2K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。