Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-2961 PoC — GNU C Library 安全漏洞

Source
Associated Vulnerability
Title:GNU C Library 安全漏洞 (CVE-2024-2961)
Description:The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
Description
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()
Readme
# CNEXT exploits

Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv(), by [@cfreal_](https://twitter.com/cfreal_)

# Technical analysis

The vulnerability and exploits are described in the following blogposts:

- [Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)](https://www.ambionics.io/blog/iconv-cve-2024-2961-p1): PHP filters
- [Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 2)](https://www.ambionics.io/blog/iconv-cve-2024-2961-p2): direct `iconv()` calls, Roundcube
- To be continued...

# Exploits

Exploits will become available as blogposts come out.

- [CNEXT: file read to RCE exploit](cnext-exploit.py)
- [Roundcube: authenticated RCE exploit](roundcube-exploit.py)
- To be continued...
File Snapshot

[4.0K] /data/pocs/3c56732c1387f1dce4dd5be20eedf1faa1972c3f ├── [ 19K] cnext-exploit.py ├── [4.0K] pocs │   ├── [1.1K] poc.c │   └── [ 983] poc.php ├── [ 794] README.md └── [ 19K] roundcube-exploit.py 1 directory, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →