Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-25646 PoC — Authenticated users can override system configurations in their requests which allows them to execute arbitrary code.

Source
Associated Vulnerability
Title:Authenticated users can override system configurations in their requests which allows them to execute arbitrary code. (CVE-2021-25646)
Description:Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
Description
Alibaba-Nacos-Unauthorized/ApacheDruid-RCE_CVE-2021-25646/MS-Exchange-SSRF-CVE-2021-26885/Oracle-WebLogic-CVE-2021-2109_RCE/RG-CNVD-2021-14536/RJ-SSL-VPN-UltraVires/Redis-Unauthorized-RCE/TDOA-V11.7-GetOnlineCookie/VMware-vCenter-GetAnyFile/yongyou-GRP-U8-XXE/Oracle-WebLogic-CVE-2020-14883/Oracle-WebLogic-CVE-2020-14882/Apache-Solr-GetAnyFile/F5-BIG-IP-CVE-2021-22986/Sonicwall-SSL-VPN-RCE/GitLab-Graphql-CNVD-2021-14193/D-Link-DCS-CVE-2020-25078/WLAN-AP-WEA453e-RCE/360TianQing-Unauthorized/360TianQing-SQLinjection/FanWeiOA-V8-SQLinjection/QiZhiBaoLeiJi-AnyUserLogin/QiAnXin-WangKangFirewall-RCE/金山-V8-终端安全系统/NCCloud-SQLinjection/ShowDoc-RCE
Readme
### 此项目暂时停止更新。在我更新到后期意识到两个问题,第一:似乎我在仓库中对安全法的声明不到位,造成了一些我不愿意看到的结果。第二:在此项目设计之初我没有考虑到一些底层架构上的东西。比如接口的通用性,比如图形化和单种框架的全版本检测才是大众更为需要的。
## 编写的POC
#### Alibaba-Nacos-Unauthorized </br>
#### ApacheDruid-RCE_CVE-2021-25646 </br>
#### MS-Exchange-SSRF-CVE-2021-26885 </br>
#### Oracle-WebLogic-CVE-2021-2109_RCE </br>
#### RG-CNVD-2021-14536 </br>
#### RJ-SSL-VPN-UltraVires </br>
#### Redis-Unauthorized-RCE </br>
#### TDOA-V11.7-GetOnlineCookie </br>
#### VMware-vCenter-GetAnyFile </br>
#### yongyou-GRP-U8-XXE </br>
#### Oracle-WebLogic-CVE-2020-14883 </br>
#### Oracle-WebLogic-CVE-2020-14882 </br>
#### Apache-Solr-GetAnyFile </br>
#### F5-BIG-IP-CVE-2021-22986 </br>
#### Sonicwall-SSL-VPN-RCE </br>
#### GitLab-Graphql-CNVD-2021-14193 </br>
#### D-Link-DCS-CVE-2020-25078 </br>
#### WLAN-AP-WEA453e-RCE </br>
#### 360TianQing-Unauthorized </br>
#### 360TianQing-SQLinjection </br>
#### FanWeiOA-V8-SQLinjection </br>
#### QiZhiBaoLeiJi-AnyUserLogin </br>
#### QiAnXin-WangKangFirewall-RCE </br>
#### 金山-V8-终端安全系统RCE </br>
#### NCCloud-SQLinjection </br>
#### ShowDoc-RCE </br>
## 关于POC</br>
这里会把作者在各种环境中遇到的繁琐漏洞简化为POC工具,以便在后续中轻松发现与利用</br>

## 免责声明 
此处提供的所有工具仅供授权状态下使用,如发生刑事案件,非授权攻击行为于本人无关.望大家熟知《网络安全法》.
File Snapshot

[4.0K] /data/pocs/aee4e3d38f50fd435e976ddfa6b6d3aec5c197bf ├── [429K] 360TianQing-SQLinjection.jar ├── [429K] 360TianQing-Unauthorized.jar ├── [414K] Alibaba-Nacos-Unauthorized.jar ├── [413K] Apache-Druid-RCE_CVE-2021-25646.jar ├── [414K] Apache-Solr-GetAnyFile.jar ├── [413K] D-Link-DCS-CVE-2020-25078.jar ├── [414K] F5-BIG-IP-CVE-2021-22986.jar ├── [429K] FanWeiOA-V8-SQLinjection.jar ├── [8.7K] GitLab-Graphql-CNVD-2021-14193.jar ├── [414K] MS-Exchange-SSRF-CVE-2021-26885.jar ├── [ 10K] NCCloud-SQLinjection.jar ├── [414K] Oracle-WebLogic-CVE-2020-14882.jar ├── [414K] Oracle-WebLogic-CVE-2020-14883.jar ├── [414K] Oracle-WebLogic-CVE-2021-2109_RCE.jar ├── [429K] QiAnXin-WangKangFirewall-RCE.jar ├── [ 10K] QiZhiBaoLeiJi-AnyUserLogin.jar ├── [1.6K] README.md ├── [1.2M] Redis-Unauthorized-RCE.jar ├── [413K] RG-CNVD-2021-14536.jar ├── [414K] RJ-SSL-VPN-UltraVires.jar ├── [416K] ShowDoc-RCE.jar ├── [414K] Sonicwall-SSL-VPN-RCE.jar ├── [414K] TDOA-V11.7-GetOnlineCookie.jar ├── [414K] VMware-vCenter-GetAnyFile.jar ├── [414K] WLAN-AP-WEA453e-RCE.jar ├── [414K] yongyou-GRP-U8-XXE.jar └── [416K] 金山-V8-终端安全系统.jar 0 directories, 27 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →