Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache HugeGraph-Server | 1.0.0 ~ 1.3.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 ) | https://github.com/Zeyad-Azima/CVE-2024-27348 | POC Details |
| 2 | Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit | https://github.com/kljunowsky/CVE-2024-27348 | POC Details |
| 3 | None | https://github.com/jakabakos/CVE-2024-27348-Apache-HugeGraph-RCE | POC Details |
| 4 | This is a repository for Apache HugeGraph Remote Code Execution vulnerability(CVE-2024-27348)) | https://github.com/p0et08/CVE-2024-27348 | POC Details |
| 5 | Apache HugeGraph-Server is an open-source graph database that provides a scalable and high-performance solution for managing and analyzing large-scale graph data. It is commonly used in Java8 and Java11 environments. However, versions prior to 1.3.0 are vulnerable to a remote command execution (RCE) vulnerability in the gremlin component. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-27348.yaml | POC Details |
| 6 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%95%B0%E6%8D%AE%E5%BA%93%E6%BC%8F%E6%B4%9E/Apache%20HugeGraph%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-27348.md | POC Details |
| 7 | https://github.com/vulhub/vulhub/blob/master/hugegraph/CVE-2024-27348/README.md | POC Details | |
| 8 | CVE-2024-27348 Exploitation Toolkit: Complete RCE exploit for Apache Huge-Graph-Server vulnerability. | https://github.com/wqfh/MasterOfTheIndestry | POC Details |
| 9 | CVE-2024-27348 Exploitation Toolkit: Complete RCE exploit for Apache Huge-Graph-Server vulnerability. | https://github.com/wqfh/CVE-2024-27348 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-27349 | Apache HugeGraph-Server: Bypass whitelist in Auth mode | |
| CVE-2024-27347 | Apache HugeGraph-Hubble: SSRF in Hubble connection page |
No comments yet