Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share) | https://github.com/betab0t/cve-2017-7494 | POC Details |
| 2 | None | https://github.com/homjxi0e/CVE-2017-7494 | POC Details |
| 3 | SambaCry exploit and vulnerable container (CVE-2017-7494) | https://github.com/opsxcq/exploit-CVE-2017-7494 | POC Details |
| 4 | CVE-2017-7494 - Detection Scripts | https://github.com/Waffles-2/SambaCry | POC Details |
| 5 | It is a simple script to exploit RCE for Samba (CVE-2017-7494 ). | https://github.com/brianwrf/SambaHunter | POC Details |
| 6 | Remote root exploit for the SAMBA CVE-2017-7494 vulnerability | https://github.com/joxeankoret/CVE-2017-7494 | POC Details |
| 7 | 搭建漏洞利用测试环境 | https://github.com/Zer0d0y/Samba-CVE-2017-7494 | POC Details |
| 8 | CVE-2017-7494 C poc | https://github.com/incredible1yu/CVE-2017-7494 | POC Details |
| 9 | cve-2017-7494 | https://github.com/cved-sources/cve-2017-7494 | POC Details |
| 10 | samba 4.5.9 | https://github.com/john-80/cve-2017-7494 | POC Details |
| 11 | A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root. | https://github.com/Hansindu-M/CVE-2017-7494_IT19115344 | POC Details |
| 12 | CVE-2017-7494 python exploit | https://github.com/0xm4ud/noSAMBAnoCRY-CVE-2017-7494 | POC Details |
| 13 | Exploit CVE-2017-7494 for Net Security course final Assignment. This would reveal the vulnerability of services that run in administrative priority on Linux. | https://github.com/I-Rinka/BIT-EternalBlue-for-macOS_Linux | POC Details |
| 14 | None | https://github.com/yinyinmeimei/CVE-2017-7494-payload | POC Details |
| 15 | According to researchers with Rapid7, over 110,000 devices appear on internet, which run stable Samba versions, while 92,500 seem to run unstable Samba versions, for which there is no fix. The newest Samba models, including the models 4.6.x before 4.6.4, 4.5.x before 4.5.10 and 3.5.0 before 4.4.13, was impacted by this error. May 24, 2017, Samba released version 4.6.4, which fixes a serious remote code execution vulnerability, vulnerability number CVE-2017-7494, which affected Samba 3.5.0 onwards. Vulnerability number: CVE-2017-7494 Severity Rating: High Affected software: • Samba Version < 4.6.4 • Samba Version < 4.5.10 • Samba Version < 4.4.14 Unaffected software: • Samba Version = 4.6.4 • Samba Version = 4.5.10 • Samba Version = 4.4.14 | https://github.com/adjaliya/-CVE-2017-7494-Samba-Exploit-POC | POC Details |
| 16 | SambaCry exploit (CVE-2017-7494) | https://github.com/00mjk/exploit-CVE-2017-7494 | POC Details |
| 17 | SambaCry (CVE-2017-7494) exploit for Samba | bind shell without Metasploit | https://github.com/d3fudd/CVE-2017-7494_SambaCry | POC Details |
| 18 | None | https://github.com/yinyinnnnn/CVE-2017-7494-payload | POC Details |
| 19 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%85%B6%E4%BB%96%E6%BC%8F%E6%B4%9E/Samba%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-7494.md | POC Details |
| 20 | https://github.com/vulhub/vulhub/blob/master/samba/CVE-2017-7494/README.md | POC Details | |
| 21 | Custom Docker Image | https://github.com/FelipeR-UFBA/cve-2017-7494-fixed | POC Details |
| 22 | None | https://github.com/sudlit/CVE-2017-7494 | POC Details |
| 23 | CDT Ansible playbook for deploying CVE-2017-7494 aka "SambaCry" to an Ubuntu box | https://github.com/Zanex360/cdt-samba-deploy | POC Details |
| 24 | CDT Ansible playbook for deploying CVE-2017-7494 aka "SambaCry" to an Ubuntu box | https://github.com/Zanex360/cdt-vulnsamba-deploy | POC Details |
No public POC found.
Login to generate AI POCNo comments yet