mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 11:06:19 +00:00
3.4 KiB
3.4 KiB
CVE-2016-4437
Description
Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
POC
Reference
- http://packetstormsecurity.com/files/137310/Apache-Shiro-1.2.4-Information-Disclosure.html
- http://packetstormsecurity.com/files/157497/Apache-Shiro-1.2.4-Remote-Code-Execution.html
Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0day666/Vulnerability-verification
- https://github.com/20142995/Goby
- https://github.com/4nth0ny1130/shisoserial
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ArrestX/--POC
- https://github.com/CTF-Archives/Puff-Pastry
- https://github.com/Calistamu/graduation-project
- https://github.com/HackJava/HackShiro
- https://github.com/HackJava/Shiro
- https://github.com/HimmelAward/Goby_POC
- https://github.com/KRookieSec/WebSecurityStudy
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/MelanyRoob/Goby
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Shadowven/Vulnerability_Reproduction
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/XuCcc/VulEnv
- https://github.com/Z0fhack/Goby_POC
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/apachecn-archive/Middleware-Vulnerability-detection
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/bigblackhat/oFx
- https://github.com/bkfish/Awesome_shiro
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/dota-st/JavaSec
- https://github.com/gobysec/Goby
- https://github.com/hksanduo/vulworkspace
- https://github.com/hktalent/Scan4all_Pro
- https://github.com/hktalent/bug-bounty
- https://github.com/huimzjty/vulwiki
- https://github.com/hxysaury/saury-vulnhub
- https://github.com/jas502n/Shiro_Xray
- https://github.com/langu-xyz/JavaVulnMap
- https://github.com/lnick2023/nicenice
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/ltfafei/my_POC
- https://github.com/luckyfuture0177/VULOnceMore
- https://github.com/m3terpreter/CVE-2016-4437
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/pizza-power/CVE-2016-4437
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/retr0-13/Goby
- https://github.com/skyblueflag/WebSecurityStudy
- https://github.com/tdtc7/qps
- https://github.com/veo/vscan
- https://github.com/woods-sega/woodswiki
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xhycccc/Shiro-Vuln-Demo
- https://github.com/xk-mt/CVE-2016-4437
- https://github.com/yaklang/vulinone
- https://github.com/zhzyker/vulmap