Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-45519 PoC — Zimbra Collaboration Server 安全漏洞

Source
Associated Vulnerability
Title:Zimbra Collaboration Server 安全漏洞 (CVE-2024-45519)
Description:The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.
Readme
# CVE-2024-45519

SMTP Vulnerability Exploit Script
Overview

This script checks for vulnerabilities in an SMTP server and, if found, exploits the vulnerability by establishing a reverse shell connection to your machine.
Features

    Port Checking: Verifies if the target SMTP port is open.
    Vulnerability Check: Sends a payload to test for vulnerability in the SMTP server.
    Exploit & Reverse Shell: If the server is vulnerable, the script executes a reverse shell, allowing you to gain access to the remote machine.

Usage

    Listen on your machine: Before running the script, open a terminal and listen for incoming connections:

    bash

    nc -lvnp 4444

    (Replace 4444 with your chosen port, matching the one in the script.)

    Run the script: If the server is vulnerable, it will connect back to your machine, and you will gain control via the terminal.

Important Notes

    Legal Use Only: This script should only be used on systems where you have explicit permission to test for vulnerabilities.
    Correct IP Configuration: Ensure the script uses your correct IP address, particularly your public IP if working outside a local network.
File Snapshot

[4.0K] /data/pocs/f0dfc0352960c9a0e8f07e3b16537a6c263ddb48 ├── [2.8K] CVE-2024-45519-Poc.py └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →