关联漏洞
标题:
Fortinet FortiManager 访问控制错误漏洞
(CVE-2024-47575)
描述:Fortinet FortiManager是美国飞塔(Fortinet)公司的一套集中化网络安全管理平台。该平台支持集中管理任意数量的Fortinet设备,并能够将设备分组到不同的管理域(ADOM)进一步简化多设备安全部署与管理。 Fortinet FortiManager存在访问控制错误漏洞,该漏洞源于缺少关键功能的身份验证,允许攻击者通过特制的请求执行任意代码或命令。以下产品及版本受到影响:FortiManager 7.6.0版本;FortiManager 7.4.4版本及之前的7.4.x版本;For
描述
CVE-2024-47575: Critical Remote Code Execution (RCE) Vulnerability in VMware Horizon
介绍
# CVE-2024-47575-POC
CVE-2024-47575: Critical Remote Code Execution (RCE) Vulnerability in VMware Horizon
--------------------------------------------------------------------------------------
**Description:** CVE-2024-47575 is a high-severity vulnerability affecting VMware Horizon. This issue exists due to insufficient validation of inputs within Horizon's API processing framework, which allows a remote attacker with network access to inject and execute arbitrary code on the server. This could lead to unauthorized system compromise, granting attackers the ability to control sensitive data or deploy additional malicious actions.

**Issue**
CVE-2024-47575 is a critical security flaw resulting from a lack of input validation in VMware Horizon's API. This weakness can be exploited by sending malicious requests, enabling unauthorized access and code execution on affected systems.
------------------------------------------------------------------------------------
**Private Exploit (Limited to 10 Hands)**
**Access exploit via private sale:**
[**Download**](https://satoshidisk.com/pay/CMkgSC)
------------------------------------------------------------------------------------
**Cause:** Insufficient input validation in Horizon's API processing.
**Impact: **Grants attackers unauthorized access, potentially leading to system compromise.
**Resolution: **VMware recommends updating to the latest patched version and monitoring for abnormal network activity.

**Exploit Instructions**
Prepare the Target: Verify the target is running a vulnerable version of VMware Horizon.
**Clone the Exploit:** Download exploit_vuln47575.py from the private repository.
**Execute Command:**
**Run arbitrary commands on the target system by executing:**
python exploit_vuln47575.py -h <target_ip> -p <target_port> -c '<command>'
**Example:**
python exploit_vuln47575.py -h 192.168.1.15 -p 443 -c 'uname -a'
**Optional Flags:**
-t: Set a custom timeout (default: 10 seconds)
-r: Retry if the initial exploit attempt fails
**Sample Command:**
python exploit_vuln47575.py -h 10.0.0.5 -p 443 -c 'whoami' -t 5 -r
**Post-Exploitation:**
If successful, the command output will be displayed in the terminal.
Additional commands can be chained for privilege escalation or data extraction as needed.

**Contact Information**
For inquiries or additional details, please contact **groshi@thesecure.biz.**
文件快照
[4.0K] /data/pocs/cccbb793e257c05528f1eee1b09a7d21f9d5ee1a
├── [ 35] Download
└── [2.6K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。