关联漏洞
标题:
VMware vCenter Server 安全漏洞
(CVE-2024-22274)
描述:VMware vCenter Server是美国威睿(VMware)公司的一套服务器和虚拟化管理软件。该软件提供了一个用于管理VMware vSphere环境的集中式平台,可自动实施和交付虚拟基础架构。 VMware vCenter Server存在安全漏洞,该漏洞源于存在经过身份验证的远程代码执行漏洞,攻击者可能会利用此漏洞在底层操作系统上运行任意命令。
介绍
# CVE-2024-22274 Exploit
This repository contains an exploit for CVE-2024-22274. The exploit creates a new user on a remote machine via SSH and then provides a root shell.
## Requirements
- Go (Golang) installed on your machine. You can download it from [here](https://golang.org/dl/).
- A remote machine with SSH access.
## Compilation
1. Clone the repository:
```sh
git clone https://github.com/Mustafa1986/CVE-2024-22274-RCE.git
cd CVE-2024-22274-RCE
```
2. Install the required packages:
```sh
go mod init cve-2024-22274
go mod tidy
go get golang.org/x/crypto/ssh
go get golang.org/x/term
```
3. Compile the Go program:
```sh
go build -o cve-2024-22274-rce main.go
```
## Usage
1. Run the compiled program:
```sh
./cve-2024-22274-rce
```
2. Follow the prompts:
- Enter the host address of the target machine.
- Enter the SSH port (default is 22).
- Enter the SSH username of the target machine.
- Enter the SSH password of the target machine.
- Enter the new username you want to create.
- Enter the new password for the new user.
3. After the user is created, you will get a root shell on the target machine. You can execute commands as the new user.
## Example
```sh
[+] CVE-2024-22274 by Mustafa
[-] Enter host address: 192.168.0.100
[-] Enter port (default 22): 22
[-] Enter SSH username: root
[-] Enter SSH password: ********
[-] Enter new username: newuser
[-] Enter new password: ********
[+] Connected to 192.168.1.100 via SSH
[+] Created user newuser on 192.168.1.100
[+] Connected user newuser via SSH
[+] Root-shell# (type 'exit' to quit):
```
Disclaimer
This code is for educational purposes only. Use it responsibly and only on systems you have permission to test.
License
This project is licensed under the MIT License - see the LICENSE file for details.
文件快照
[4.0K] /data/pocs/c9955679bef94d8eb74d4894541c2e3919776add
├── [4.9M] cve-2024-22274-rce
├── [ 148] go.mod
├── [ 467] go.sum
├── [3.2K] main.go
└── [1.8K] README.md
0 directories, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。