关联漏洞
描述
CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection
介绍
# CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection
CVEHunter tool for vulnerability detection and exploitation tool for CVE-2024-50603 with Asychronous Performance.
<h1 align="center">
<img src="https://github.com/user-attachments/assets/6f360b42-bd54-4e88-a4fd-aca25ffa9d7a" width="2000px">
<br>
</h1>
### Installation
```bash
git clone https://github.com/th3gokul/CVE-2024-50603.git
cd CVE-2024-50603
pip install -r requirements.txt
python3 cvehunter.py --help@RevoltSecurities
```
```bash
python3 cvehunter.py -h
▄████▄ ██▒ █▓▓█████ ██░ ██ █ ██ ███▄ █ ▄▄▄█████▓▓█████ ██▀███
▒██▀ ▀█▓██░ █▒▓█ ▀ ▓██░ ██▒ ██ ▓██▒ ██ ▀█ █ ▓ ██▒ ▓▒▓█ ▀ ▓██ ▒ ██▒
▒▓█ ▄▓██ █▒░▒███ ▒██▀▀██░▓██ ▒██░▓██ ▀█ ██▒▒ ▓██░ ▒░▒███ ▓██ ░▄█ ▒
▒▓▓▄ ▄██▒▒██ █░░▒▓█ ▄ ░▓█ ░██ ▓▓█ ░██░▓██▒ ▐▌██▒░ ▓██▓ ░ ▒▓█ ▄ ▒██▀▀█▄
▒ ▓███▀ ░ ▒▀█░ ░▒████▒░▓█▒░██▓▒▒█████▓ ▒██░ ▓██░ ▒██▒ ░ ░▒████▒░██▓ ▒██▒
░ ░▒ ▒ ░ ░ ▐░ ░░ ▒░ ░ ▒ ░░▒░▒░▒▓▒ ▒ ▒ ░ ▒░ ▒ ▒ ▒ ░░ ░░ ▒░ ░░ ▒▓ ░▒▓░
░ ▒ ░ ░░ ░ ░ ░ ▒ ░▒░ ░░░▒░ ░ ░ ░ ░░ ░ ▒░ ░ ░ ░ ░ ░▒ ░ ▒░
░ ░░ ░ ░ ░░ ░ ░░░ ░ ░ ░ ░ ░ ░ ░ ░░ ░
░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░
CVE-2024-50603 @th3gokul & @th3sanjai
[Description]: Vulnerability Detection and Exploitation tool for CVE-2024-34102
options:
-h, --help show this help message and exit
-u URL, --url URL [INF]: Specify a URL or domain for vulnerability detection
-l LIST, --list LIST [INF]: Specify a list of URLs for vulnerability detection
-t THREADS, --threads THREADS
[INF]: Number of threads for list of URLs
-proxy PROXY, --proxy PROXY
[INF]: Proxy URL to send request via your proxy
-v, --verbose [INF]: Increases verbosity of output in console
-o OUTPUT, --output OUTPUT
[INF]: Filename to save output of vulnerable target]
```
### Reference
https://www.securing.pl/en/cve-2024-50603-aviatrix-network-controller-command-injection-vulnerability/
### About:
The CVEHunter tool is an exploitation tool for CVE-2024-34102 and the Devlopers of the tool are
- [Th3Gokul @RevoltSecurities](https://www.linkedin.com/in/gokul-v-13455521a/)
- [Th3sanjai @RevoltSecurities](https://www.linkedin.com/in/d-sanjai-kumar-109a7227b/)
and We specially Thank [bebik](https://github.com/bebiksior) and his [SSRF](ssrf.cvssadvisor.com/) tool which helped in our research and exploitation
on CVE-2024-50603 to know the callbacks, pings and find accurate results while exploiting this vulnerability, We appreciate him for the great contribution for Open Source Community.
### Disclaimer
The tool ⚒️ is only for education 📖 and ethical purpose only and Developers are not responsible for any illegal exploitations.
文件快照
[4.0K] /data/pocs/e70e0325017cadb4cdf4caefa845d0671e7ecfd7
├── [ 12K] cvehunter.py
└── [3.6K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。