CVE-2017-7269 远程代码执行回显验证
我们团队对此次 CVE-2017-7269 漏洞的分析报告: https://ht-sec.org/cve-2017-7269-vulnerabilities/
默认PoC 只能弹calc.exe
,现在修改成可以响应请求,命令格式为:
CVE-2017-7269_remote_echo.py ip_address port
效果如下:
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
CVE-2017-7269 回显PoC ,用于远程漏洞检测..
Switch branches/tags
Nothing to show
If nothing happens, download GitHub Desktop and try again.
If nothing happens, download GitHub Desktop and try again.
If nothing happens, download Xcode and try again.
If nothing happens, download the GitHub extension for Visual Studio and try again.
lcatro Merge pull request #4 from rewanth1997/upgrade
Update other port scan (not only 80) ,Thanks @rewanth1997
Latest commit
72f261c
Type | Name | Latest commit message | Commit time |
---|---|---|---|
Failed to load latest commit information. | |||
CVE-2017-7269_remote_echo.py | Upgrades the script. Closes #3 |
|
|
example.png | add base code |
|
|
readme.md | update readme |
|
我们团队对此次 CVE-2017-7269 漏洞的分析报告: https://ht-sec.org/cve-2017-7269-vulnerabilities/
默认PoC 只能弹calc.exe
,现在修改成可以响应请求,命令格式为:
CVE-2017-7269_remote_echo.py ip_address port
效果如下: