POC详情: 81494e511b0c326f57c6ea7ff642f423da280007

来源
关联漏洞
标题: SOPlanning 安全漏洞 (CVE-2024-27115)
描述:SOPlanning是SOPlanning公司的一套在线项目管理软件。 SOPlanning存在安全漏洞。攻击者利用该漏洞可以在底层系统上执行代码。
描述
Exploit For SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
介绍
# SOPlanning 1.52.01 - Remote Code Execution (RCE) (Authenticated)

## Exploit Details

- **Exploit Title**: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
- **Date**: 6th October, 2024
- **Exploit Author**: Ardayfio Samuel Nii Aryee
- **Version**: 1.52.01
- **Tested on**: Ubuntu

## Description

This repository contains an exploit for a Remote Code Execution (RCE) vulnerability in SOPlanning version 1.52.01. The exploit allows authenticated users to upload a malicious PHP file and execute arbitrary commands on the server.

## Usage

### Prerequisites

- Python 3.x
- `requests` library (Install with `pip install requests`)

### Exploit Instructions

1. Clone this repository:
   ```bash
   git clone https://github.com/TheExploiters/SOPlanning-RCE-1.52.01.git
   cd SOPlanning-RCE-1.52.01
   ```

2. Run the exploit script:
   ```bash
   python3 SOPlanning-1.52.01-RCE-Exploit.py -t <target> -u <user> -p <pass>
   ```

   Replace `http://example.com:9090` with the target URL, `admin` with the username, and `admin` with the password.

3. After successful execution, access the web shell:
   ```
   Access webshell here: http://example.com/upload/files/{link_id}/{php_filename}?cmd=<command>
   ```

4. To use the interactive shell, respond with `yes` when prompted.

### Command Example

```bash
python3 SOPlanning-1.52.01-RCE-Exploit.py -t <target> -u <user> -p <pass>
```

## Disclaimer

This exploit was authored by Ardayfio Samuel Nii Aryee and is provided for educational purposes only. The author and repository owner are not responsible for any misuse or damage caused. Ensure you have explicit permission before testing this exploit on any system.



![Repo View Counter](https://profile-counter.glitch.me/SOPlanning-1.52.01-RCE-Exploit/count.svg)
文件快照

[4.0K] /data/pocs/81494e511b0c326f57c6ea7ff642f423da280007 ├── [1.8K] README.md └── [2.6K] SOPlanning-1.52.01-RCE-Exploit.py 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。