cve/2023/CVE-2023-1671.md

32 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-1671](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1671)
![](https://img.shields.io/static/v1?label=Product&message=Sophos%20Web%20Appliance&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%204.3.10.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
### POC
#### Reference
- http://packetstormsecurity.com/files/172016/Sophos-Web-Appliance-4.3.10.4-Command-Injection.html
#### Github
- https://github.com/0xdolan/cve_poc
- https://github.com/H4lo/awesome-IoT-security-article
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/W01fh4cker/CVE-2023-1671-POC
- https://github.com/abrahim7112/Vulnerability-checking-program-for-Android
- https://github.com/behnamvanda/CVE-2023-1671
- https://github.com/c4ln/CVE-2023-1671-POC
- https://github.com/csffs/cve-2023-1671
- https://github.com/getdrive/PoC
- https://github.com/iluaster/getdrive_PoC
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/ohnonoyesyes/CVE-2023-1671