mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-08 19:46:43 +00:00
78 lines
3.4 KiB
Markdown
78 lines
3.4 KiB
Markdown
![]() |
### [CVE-2016-4437](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4437)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/137310/Apache-Shiro-1.2.4-Information-Disclosure.html
|
||
|
- http://packetstormsecurity.com/files/157497/Apache-Shiro-1.2.4-Remote-Code-Execution.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0day404/vulnerability-poc
|
||
|
- https://github.com/0day666/Vulnerability-verification
|
||
|
- https://github.com/20142995/Goby
|
||
|
- https://github.com/4nth0ny1130/shisoserial
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/ArrestX/--POC
|
||
|
- https://github.com/CTF-Archives/Puff-Pastry
|
||
|
- https://github.com/Calistamu/graduation-project
|
||
|
- https://github.com/HackJava/HackShiro
|
||
|
- https://github.com/HackJava/Shiro
|
||
|
- https://github.com/HimmelAward/Goby_POC
|
||
|
- https://github.com/KRookieSec/WebSecurityStudy
|
||
|
- https://github.com/KayCHENvip/vulnerability-poc
|
||
|
- https://github.com/MelanyRoob/Goby
|
||
|
- https://github.com/Miraitowa70/POC-Notes
|
||
|
- https://github.com/Ostorlab/KEV
|
||
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||
|
- https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker
|
||
|
- https://github.com/SexyBeast233/SecBooks
|
||
|
- https://github.com/Shadowven/Vulnerability_Reproduction
|
||
|
- https://github.com/Threekiii/Awesome-Exploit
|
||
|
- https://github.com/Threekiii/Awesome-POC
|
||
|
- https://github.com/Threekiii/Vulhub-Reproduce
|
||
|
- https://github.com/XuCcc/VulEnv
|
||
|
- https://github.com/Z0fhack/Goby_POC
|
||
|
- https://github.com/Zero094/Vulnerability-verification
|
||
|
- https://github.com/apachecn-archive/Middleware-Vulnerability-detection
|
||
|
- https://github.com/bakery312/Vulhub-Reproduce
|
||
|
- https://github.com/bigblackhat/oFx
|
||
|
- https://github.com/bkfish/Awesome_shiro
|
||
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
||
|
- https://github.com/dota-st/JavaSec
|
||
|
- https://github.com/gobysec/Goby
|
||
|
- https://github.com/hksanduo/vulworkspace
|
||
|
- https://github.com/hktalent/Scan4all_Pro
|
||
|
- https://github.com/hktalent/bug-bounty
|
||
|
- https://github.com/huimzjty/vulwiki
|
||
|
- https://github.com/hxysaury/saury-vulnhub
|
||
|
- https://github.com/jas502n/Shiro_Xray
|
||
|
- https://github.com/langu-xyz/JavaVulnMap
|
||
|
- https://github.com/lnick2023/nicenice
|
||
|
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
|
||
|
- https://github.com/ltfafei/my_POC
|
||
|
- https://github.com/luckyfuture0177/VULOnceMore
|
||
|
- https://github.com/m3terpreter/CVE-2016-4437
|
||
|
- https://github.com/pen4uin/awesome-vulnerability-research
|
||
|
- https://github.com/pen4uin/vulnerability-research
|
||
|
- https://github.com/pen4uin/vulnerability-research-list
|
||
|
- https://github.com/pizza-power/CVE-2016-4437
|
||
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||
|
- https://github.com/retr0-13/Goby
|
||
|
- https://github.com/skyblueflag/WebSecurityStudy
|
||
|
- https://github.com/tdtc7/qps
|
||
|
- https://github.com/veo/vscan
|
||
|
- https://github.com/woods-sega/woodswiki
|
||
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
||
|
- https://github.com/xhycccc/Shiro-Vuln-Demo
|
||
|
- https://github.com/xk-mt/CVE-2016-4437
|
||
|
- https://github.com/yaklang/vulinone
|
||
|
- https://github.com/zhzyker/vulmap
|
||
|
|