目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1020

100%

CVE-2024-27115 PoC — SOPlanning 安全漏洞

来源
关联漏洞
标题:SOPlanning 安全漏洞 (CVE-2024-27115)
Description:SOPlanning是SOPlanning公司的一套在线项目管理软件。 SOPlanning存在安全漏洞。攻击者利用该漏洞可以在底层系统上执行代码。
Description
Exploit For SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
介绍
# SOPlanning 1.52.01 - Remote Code Execution (RCE) (Authenticated)

## Exploit Details

- **Exploit Title**: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
- **Date**: 6th October, 2024
- **Exploit Author**: Ardayfio Samuel Nii Aryee
- **Version**: 1.52.01
- **Tested on**: Ubuntu

## Description

This repository contains an exploit for a Remote Code Execution (RCE) vulnerability in SOPlanning version 1.52.01. The exploit allows authenticated users to upload a malicious PHP file and execute arbitrary commands on the server.

## Usage

### Prerequisites

- Python 3.x
- `requests` library (Install with `pip install requests`)

### Exploit Instructions

1. Clone this repository:
   ```bash
   git clone https://github.com/TheExploiters/SOPlanning-RCE-1.52.01.git
   cd SOPlanning-RCE-1.52.01
   ```

2. Run the exploit script:
   ```bash
   python3 SOPlanning-1.52.01-RCE-Exploit.py -t <target> -u <user> -p <pass>
   ```

   Replace `http://example.com:9090` with the target URL, `admin` with the username, and `admin` with the password.

3. After successful execution, access the web shell:
   ```
   Access webshell here: http://example.com/upload/files/{link_id}/{php_filename}?cmd=<command>
   ```

4. To use the interactive shell, respond with `yes` when prompted.

### Command Example

```bash
python3 SOPlanning-1.52.01-RCE-Exploit.py -t <target> -u <user> -p <pass>
```

## Disclaimer

This exploit was authored by Ardayfio Samuel Nii Aryee and is provided for educational purposes only. The author and repository owner are not responsible for any misuse or damage caused. Ensure you have explicit permission before testing this exploit on any system.



![Repo View Counter](https://profile-counter.glitch.me/SOPlanning-1.52.01-RCE-Exploit/count.svg)
文件快照

[4.0K] /data/pocs/81494e511b0c326f57c6ea7ff642f423da280007 ├── [1.8K] README.md └── [2.6K] SOPlanning-1.52.01-RCE-Exploit.py 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
    3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →