Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Spring | Spring Cloud Data Flow | 2.11.x ~ 2.11.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Analysis , Demo exploit and poc about CVE-2024-37084 | https://github.com/Kayiyan/CVE-2024-37084-Poc | POC Details |
| 2 | Spring Cloud Remote Code Execution | https://github.com/vuhz/CVE-2024-37084 | POC Details |
| 3 | Spring Cloud Data Flow CVE-2024-37084 exp | https://github.com/Ly4j/CVE-2024-37084-Exp | POC Details |
| 4 | Spring Cloud Data Flow CVE-2024-37084 exp | https://github.com/A0be/CVE-2024-37084-Exp | POC Details |
| 5 | CVE-2024-37084是Spring Cloud Data Flow中的一个高危漏洞,影响版本为2.11.0至2.11.3。该漏洞允许具有Skipper服务器API访问权限的攻击者通过精心构造的上传请求,将任意文件写入服务器文件系统的任意位置,进而可能导致远程代码执行,严重威胁服务器安全。 | https://github.com/XiaomingX/cve-2024-37084-Poc | POC Details |
No public POC found.
Login to generate AI POCNo comments yet