POC详情: cd3545559c04866980b5b04c5951a71bab3b1eac

来源
关联漏洞
标题: WSO2 API Manager 路径遍历漏洞 (CVE-2022-29464)
描述:WSO2 API Manager是美国WSO2公司的一套API生命周期管理解决方案。 WSO2 API Manager 存在路径遍历漏洞,该漏洞允许无限制的文件上传和远程代码执行。
描述
Mass Exploit for CVE 2022-29464 on Carbon
介绍
## Meow Meow Meow!<br>

Just a Mass Exploit based on a Python PoC for # WSO2 Carbon Server [CVE-2022-29464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29464)<br>
Pre-auth RCE bug  [CVE-2022-29464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29464).<br>
## Meow Meow Meow? Requirements? <br>
<br>
Python3<br>
Shodan<br>
Zoomeye<br>
A Brain<br>

## What is this tool? <br>

This is a mass-autoscan-exploit of [CVE-2022-29464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29464) based on the PoC wrote in python by a third part.<br>
The Py file is available and readable, see also the bash script that don't contain any encoded string.<br>
Massexploit will upload a shell and a reverse shell and print out the path to access it. Easy, Quick and Cool.<br>
I know that probably the code could be wrote better and saving some lines, but i did it when i was drunk and just to do something.<br>
So?<br>
Just run:<br>

```bash
./mass_exploit.sh
```
This command can setup your shodan and zoomeye tool, API included (if you want to skip the setup of tools or api, just press enter to skip.)<br>
Then it start search for vulnerable hosts based on the dorks (examples are provided in the file examples_dorks.txt).<br>
If you prefer, the manual mode is always available through the command below.<br>
The mass_exploit.sh output will be printed in the shell screen.<br>

![PoC](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464/blob/12c649eddaed6033a1aec05d27fc93408900a128/poc.png)<br>


```bash
python3 exploit.py -u host:port
```
or easily:

```bash
python3 exploit.py -f <file>
```
################################################################<br>
## Search tools: <br>
## Shodan  <br>
Get your account and an API Key here: https://account.shodan.io/<br>
```bash
sudo apt-get install python-setuptools -y
sudo apt-get install pip -y
pip install shodan
easy_install shodan
```
## Zoomeye <br>
Get an account and your API Key here: https://www.zoomeye.org/
```bash
pip3 install git+https://github.com/knownsec/ZoomEye-python.git
```
## Enjoy it <br>
This tool has been provided just for accademic purposes. I am not responsible for any illegal action made with this code.<br>
Electrolulz - https://github.com/electr0lulz - electrolulz@protonmail.com<br>
Tested on a Ubuntu based O.S.
文件快照

[4.0K] /data/pocs/cd3545559c04866980b5b04c5951a71bab3b1eac ├── [ 185] dorks_example.txt ├── [4.5K] exploit.py ├── [ 34K] LICENSE ├── [4.2K] mass_exploit.sh ├── [206K] poc.png ├── [2.3K] README.md └── [3.5K] results_shodan_example.txt 0 directories, 7 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。