mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
32 lines
1.4 KiB
Markdown
32 lines
1.4 KiB
Markdown
![]() |
### [CVE-2023-1671](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1671)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/172016/Sophos-Web-Appliance-4.3.10.4-Command-Injection.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xdolan/cve_poc
|
||
|
- https://github.com/H4lo/awesome-IoT-security-article
|
||
|
- https://github.com/Mr-xn/Penetration_Testing_POC
|
||
|
- https://github.com/Ostorlab/KEV
|
||
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||
|
- https://github.com/W01fh4cker/CVE-2023-1671-POC
|
||
|
- https://github.com/abrahim7112/Vulnerability-checking-program-for-Android
|
||
|
- https://github.com/behnamvanda/CVE-2023-1671
|
||
|
- https://github.com/c4ln/CVE-2023-1671-POC
|
||
|
- https://github.com/csffs/cve-2023-1671
|
||
|
- https://github.com/getdrive/PoC
|
||
|
- https://github.com/iluaster/getdrive_PoC
|
||
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/ohnonoyesyes/CVE-2023-1671
|
||
|
|