Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-34328 PoC — Sielox AnyWare 安全漏洞

Source
Associated Vulnerability
Title:Sielox AnyWare 安全漏洞 (CVE-2024-34328)
Description:An open redirect in Sielox AnyWare v2.1.2 allows attackers to execute a man-in-the-middle attack via a crafted URL.
Readme

# CVE-2024-34328 Open Redirection via Host Header

## 📝 Overview

**Vulnerability Title**: Open Redirection via Host Header  
**Product**: Sielox AnyWare  
**Version Affected**: 2.1.2  
**CVE ID**: CVE-2024-34328
**Severity**: Medium  
**Attack Vector**: Remote  
**Impact**: Open Redirection / Phishing

---

## 🧨 Description

An attacker can craft a URL with a **modified `Host` header** that points to a malicious domain under their control. When users click the malicious link, they are redirected to the attacker's domain — potentially leading to **phishing**, **credential theft**, or **malware delivery**.

This vulnerability arises due to the application’s improper validation of the `Host` header when generating absolute URLs during redirection.

---

## 🖼️ Proof of Concept (PoC)

### 🔗 Modified Host Header Attack

Below are two images demonstrating the exploit process:

**Step 1**: Malicious URL crafted using the Host header  
![Modified Host Header Exploit](./img1.png)

**Step 2**: Victim is redirected to an attacker-controlled domain  
![Redirected to Attacker Site](./img2.png)

---

## 🛡️ Mitigation

- Validate and sanitize the `Host` header server-side.
- Use a fixed host value for redirection logic.
- Implement allow-lists for trusted redirect domains.
- Avoid dynamic redirects based on untrusted user input.

---

## 🔒 Impact

Successful exploitation may allow attackers to:
- Redirect users to phishing sites
- Bypass security filters that rely on host validation
- Abuse trust relationships between users and the original application

---

## 👨‍💻 Author

Security Researcher – Kevin Suckiel // 0xsu3ks

---

## ⚠️ Legal Note

This research is for **educational purposes and responsible disclosure**. The author is not liable for any misuse of this information.
File Snapshot

[4.0K] /data/pocs/4215ae9bd4eefe56de65c3546fa662dff10c4358 ├── [ 26K] img1.png ├── [ 60K] img2.png └── [1.8K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →