Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2023-43040 PoC — IBM Spectrum Fusion HCI improper access control

Source
Associated Vulnerability
Title:IBM Spectrum Fusion HCI improper access control (CVE-2023-43040)
Description:IBM Spectrum Fusion HCI 2.5.2 through 2.7.2 could allow an attacker to perform unauthorized actions in RGW for Ceph due to improper bucket access. IBM X-Force ID: 266807.
Description
CVE-2023-43040 PoC
Readme
# CVE-2023-43040

This repository contains a proof-of-concept exploit for the CVE-2023-43040 vulnerability found in RADOS Gateway (RADOSGW). This vulnerability allows attackers to upload objects to any bucket accessible by the specified access key, potentially leading to unauthorized data manipulation or exfiltration.

```shell
$ pip install -r requirements.txt
$ python CVE-2023-43040.py --access_key 699GVXAYVZ5A3ZRYSCI0 --secret_key UZAHHNF3WzASPKCnDdQ8rCvAKaBvLlkZI2V8n7We --endpoint http://127.0.0.1:8080
```

<img src="https://github.com/riza/CVE-2023-43040/blob/main/CVE-2023-43040.jpg?raw=true" />

## References

* [CVE-2023-43040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43040)
* [quincy: [CVE-2023-43040] rgw: Fix bucket validation against POST policies](https://github.com/ceph/ceph/pull/53757)

## Disclaimer
This repository is for educational purposes only. The information and code provided herein are meant to demonstrate the vulnerability and are not intended for malicious use. The author is not responsible for any misuse of the provided code. Use this information responsibly and only in environments where you have explicit permission to test and secure systems. Unauthorized use of this information or code may be illegal and unethical.

## Author
* [Rıza Sabuncu](https://twitter.com/rizasabuncu)
File Snapshot

[4.0K] /data/pocs/52f7347434ab9d6f71d817479b21f86b5c5a99b6 ├── [176K] CVE-2023-43040.jpg ├── [5.7K] CVE-2023-43040.py ├── [1.3K] README.md └── [ 65] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →