POC详情: fffdce51365432fc7348ca46bfb58ae6e23515c8

来源
关联漏洞
标题: CyberPanel 安全漏洞 (CVE-2024-51378)
描述:CyberPanel是Usman Nasir个人开发者的一款内置了DNS和电子邮件服务器的虚拟主机控制面板。 CyberPanel存在安全漏洞,该漏洞源于dns/views.py 中的 getresetstatus 允许远程攻击者绕过身份验证并通过 /ftp/getresetstatus 执行任意命令。
描述
A Python script to scan websites for the CVE-2024-51378 vulnerability.
介绍
# CVE-2024-51378 Vulnerability Scanner
![Screenshot](https://i.imgur.com/EN1pvZF.png)
A Python script to scan websites for the CVE-2024-51378 vulnerability.

## Features
- Identifies vulnerable sites based on CSRF tokens and custom endpoints.
- Highlights results as `[GOOD]` or `[SAFE]` with color-coded outputs.
- Logs detailed scan results to a file.
- Displays ASCII art with project details.

## Requirements
- Python 3.6+
- Required libraries:
  - `httpx`
  - `pyfiglet`

## Installation
1. Clone the repository:
   git clone https://github.com/i0x29A/CVE-2024-51378.git
   cd CVE-2024-51378

2. Install dependencies:
   pip install -r requirements.txt

## Usage
1. Prepare a file containing URLs to scan (one per line).

2. Run the script:
   python3 scanner.py <file> <output>
   - `<file>`: Path to the file with URLs.
   - `<output>`: Path to save the log file.

### Example
File `targets.txt`:
http://example.com
http://testsite.org

Run the scanner:
python3 scanner.py targets.txt results.log

## Notes
- Use responsibly! This tool is for educational and testing purposes only.
- Ensure compliance with all applicable laws and policies when using the scanner.

## License
This project is licensed under the MIT License. See the [LICENSE](LICENSE) file for details.

## Authors
- [@Luka Petrovic](https://github.com/refr4g)
- [@cr4shed](https://github.com/i0x29A)
文件快照

[4.0K] /data/pocs/fffdce51365432fc7348ca46bfb58ae6e23515c8 ├── [3.2K] CVE-2024-51378.py ├── [1.0K] LICENSE ├── [1.3K] README.md └── [ 15] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。