Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2007-2447

EPSS 77.38% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2007-2447

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Samba MS-RPC Shell命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Samba是Samba团队开发的一套可使UNIX系列的操作系统与微软Windows操作系统的SMB/CIFS网络协议做连结的自由软件。该软件支持共享打印机、互相传输资料文件等。 Samba在处理用户数据时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上执行任意命令。 Samba中负责在SAM数据库更新用户口令的代码未经过滤便将用户输入传输给了/bin/sh。如果在调用smb.conf中定义的外部脚本时,通过对/bin/sh的MS-RPC调用提交了恶意输入的话,就可能允许攻击者以nobody用户的权限执
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2007-2447

#POC DescriptionSource LinkShenlong Link
1CVE-2007-2447 - Samba usermap scripthttps://github.com/amriunix/CVE-2007-2447POC Details
2A simple exploit for CVE-2007-2447https://github.com/b1fair/smb_usermapPOC Details
3Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.https://github.com/JoseBarrios/CVE-2007-2447POC Details
4Nonehttps://github.com/3x1t1um/CVE-2007-2447POC Details
5Exploit for the vulnerability CVE-2007-2447https://github.com/xlcc4096/exploit-CVE-2007-2447POC Details
6Nonehttps://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3POC Details
7Python implementation of 'Username' map script' RCE Exploit for Samba 3.0.20 < 3.0.25rc3 (CVE-2007-2447).https://github.com/Ziemni/CVE-2007-2447-in-PythonPOC Details
8Nonehttps://github.com/0xKn/CVE-2007-2447POC Details
9Exploit Sambahttps://github.com/ozuma/CVE-2007-2447POC Details
10Samba 3.0.20 username map script exploithttps://github.com/un4gi/CVE-2007-2447POC Details
11cve-2007-2447 this script was rewrite the part of Metasploit modules to python3https://github.com/G01d3nW01f/CVE-2007-2447POC Details
12 Samba usermap script.https://github.com/cherrera0001/CVE-2007-2447POC Details
13CVE-2007-2447 - Samba usermap scripthttps://github.com/Alien0ne/CVE-2007-2447POC Details
14Nonehttps://github.com/3t4n/samba-3.0.24-CVE-2007-2447-vunerable-POC Details
15Exploit code for CVE-2007-2447 written in Python3.https://github.com/xbufu/CVE-2007-2447POC Details
16Nonehttps://github.com/s4msec/CVE-2007-2447POC Details
17Nonehttps://github.com/0xConstant/CVE-2007-2447POC Details
18CVE-2007-2447https://github.com/Nosferatuvjr/Samba-Usermap-exploitPOC Details
19Nonehttps://github.com/testaross4/CVE-2007-2447POC Details
20CVE-2007-2447 samba remote code executionhttps://github.com/mr-l0n3lly/CVE-2007-2447POC Details
21CVE-2007-2447 exploit written in python to get reverse shellhttps://github.com/HerculesRD/PyUsernameMapScriptRCEPOC Details
22automated script for exploiting CVE-2007-2447https://github.com/Aviksaikat/CVE-2007-2447POC Details
23Nonehttps://github.com/crypticdante/CVE-2007-2447POC Details
24Exploit i used in HTBhttps://github.com/bdunlap9/CVE-2007-2447_pythonPOC Details
25Samba 3.0.20https://github.com/MikeRega7/CVE-2007-2447-RCEPOC Details
26Samba Reverse Shellhttps://github.com/0xTabun/CVE-2007-2447POC Details
27Nonehttps://github.com/ShivamDey/Samba-CVE-2007-2447-ExploitPOC Details
28Nonehttps://github.com/H3xL00m/CVE-2007-2447POC Details
29Nonehttps://github.com/n3ov4n1sh/CVE-2007-2447POC Details
30Samba 3.0.0 - 3.0.25rc3https://github.com/Juantos/cve-2007-2447POC Details
31Nonehttps://github.com/c0d3cr4f73r/CVE-2007-2447POC Details
32Exploit Samba smbd 3.0.20-Debianhttps://github.com/Sp3c73rSh4d0w/CVE-2007-2447POC Details
33This is a exploit for CVE-2007-2447; Vulnerable SMB https://github.com/IamLucif3r/CVE-2007-2447-ExploitPOC Details
34Exploit Samba smbd 3.0.20-Debianhttps://github.com/0xwh1pl4sh/CVE-2007-2447POC Details
35Exploit Samba smbd 3.0.20-Debianhttps://github.com/N3rdyN3xus/CVE-2007-2447POC Details
36Exploit Samba smbd 3.0.20-Debianhttps://github.com/NyxByt3/CVE-2007-2447POC Details
37Exploit Samba smbd 3.0.20-Debianhttps://github.com/h3xcr4ck3r/CVE-2007-2447POC Details
38Exploit Samba smbd 3.0.20-Debianhttps://github.com/n3rdh4x0r/CVE-2007-2447POC Details
39Nonehttps://github.com/banomaly/CVE-2007-2447POC Details
40Nonehttps://github.com/foudadev/CVE-2007-2447POC Details
41CVE-2007-2447 samba remote code executionhttps://github.com/b3m0x00/CVE-2007-2447POC Details
42CVE-2007-2447 samba remote code executionhttps://github.com/b33m0x00/CVE-2007-2447POC Details
43Nonehttps://github.com/elphon/CVE-2007-2447-ExploitPOC Details
44Exploit Samba smbd 3.0.20-Debianhttps://github.com/h3x0v3rl0rd/CVE-2007-2447POC Details
45Nonehttps://github.com/DevinLiggins14/SMB-PenTest-Exploiting-CVE-2007-2447-on-Metasploitable-2POC Details
46just remeber how small mistake in santisize username could give yoy root access to the full machine https://github.com/MrRoma577/exploit_cve-2007-2447_againPOC Details
47A Rust implementation of the CVE-2007-2447 exploit targeting Samba smbd 3.0.20-Debian.https://github.com/nika0x38/CVE-2007-2447POC Details
48Hands-on pentest project using Kali Linux vs Metasploitable2. Includes full workflow: Nmap scanning, enumeration, Metasploit exploitation (Samba CVE-2007-2447), post-exploitation validation, and mitigation steps. Repo contains commands, outputs, and report showing both offensive techniques and defensive recommendations.https://github.com/SeifEldienAhmad/Penetration-Testing-on-Metasploitable2POC Details
49Nonehttps://github.com/nulltrace1336/Samba-Exploit-CVE-2007-2447POC Details
50Nonehttps://github.com/abdulsaabir/CVE-2007-2447POC Details
51Samba 3.0.20 CVE-2007-2447 Exploithttps://github.com/r0tn3x/CVE-2007-2447POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2007-2447

登录查看更多情报信息。

Same Patch Batch · n/a · 2007-05-14 · 41 CVEs total

CVE-2007-2668Webdesproxy GET Request 缓冲区溢出漏洞
CVE-2007-2659PhpATM 'Index.PHP' 目录遍历漏洞
CVE-2007-2660Vincent Blavet PhpConcept Library PHP远程文件包含漏洞
CVE-2007-2661BlogMe 'Archshow.ASP' SQL注入漏洞
CVE-2007-2662EfesTECH Haber 多个SQL注入漏洞
CVE-2007-2663Beacon 'Splash.lang.PHP' languagePath参数远程文件包含漏洞
CVE-2007-2664Yaap 'common.php' PHP远程文件包含漏洞
CVE-2007-2665RETIRED: PHPFirstPost 'Block.PHP' 远程文件包含漏洞
CVE-2007-2666Notepad++ Ruby源文件处理远程栈溢出漏洞
CVE-2007-2667DB Software Laboratory VImpX控件远程栈溢出漏洞
CVE-2007-2658ID Automation Linear Barcode ActiveX控件远程栈溢出漏洞
CVE-2007-2669PHPChain 多个跨站脚本攻击漏洞
CVE-2007-2670PHPChain 多个跨站脚本攻击漏洞
CVE-2007-2671Mozilla Firefox HREF属性拒绝服务漏洞
CVE-2007-2672PHP Coupon Script 'index.php' SQL注入漏洞
CVE-2007-2673Censura 'Censura.PHP' SQL注入漏洞
CVE-2007-2674Pre Shopping Mall 'Detail.PHP' SQL注入漏洞
CVE-2007-2675Pre Classifieds Listings 'search.php' SQL注入漏洞
CVE-2007-2676Open Translation Engine 'Header.PHP'远程文件包含漏洞
CVE-2007-2677PHPChess Root_Path 'language.php' 多个远程文件包含漏洞

Showing top 20 of 41 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2007-2447

No comments yet


Leave a comment