Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Sophos | Sophos Web Appliance | unspecified ~ 4.3.10.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Pre-Auth RCE in Sophos Web Appliance | https://github.com/ohnonoyesyes/CVE-2023-1671 | POC Details |
| 2 | CVE-2023-1671-POC, based on dnslog platform | https://github.com/W01fh4cker/CVE-2023-1671-POC | POC Details |
| 3 | Exploit to cve-2023-1671. So there is a test and exploitation function. The test sends a ping request to the dnslog domain from the vulnerable site. If the ping passes, the vulnerability exists, if it doesn't, then cve-2023-1671 is missing. The exploit function, on the other hand, sends a request with your command to the server. | https://github.com/csffs/cve-2023-1671 | POC Details |
| 4 | A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-1671.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-4934 | 7.2 HIGH | Sophos Web Appliance 命令注入漏洞 |
| CVE-2020-36692 | 6.5 MEDIUM | Sophos Web Appliance 跨站脚本漏洞 |
No comments yet