Skip to content

th3gokul/CVE-2024-50603

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

8 Commits
Β 
Β 
Β 
Β 

Repository files navigation

CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection

CVEHunter tool for vulnerability detection and exploitation tool for CVE-2024-50603 with Asychronous Performance.


Installation

git clone https://github.com/th3gokul/CVE-2024-50603.git
cd CVE-2024-50603
pip install -r requirements.txt
python3 cvehunter.py --help@RevoltSecurities
python3 cvehunter.py -h

 β–„β–ˆβ–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–’   β–ˆβ–“β–“β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆβ–‘ β–ˆβ–ˆ  β–ˆ    β–ˆβ–ˆ  β–ˆβ–ˆβ–ˆβ–„    β–ˆ β–„β–„β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–“β–“β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆβ–€β–ˆβ–ˆβ–ˆ  
β–’β–ˆβ–ˆβ–€ β–€β–ˆβ–“β–ˆβ–ˆβ–‘   β–ˆβ–’β–“β–ˆ   β–€ β–“β–ˆβ–ˆβ–‘ β–ˆβ–ˆβ–’ β–ˆβ–ˆ  β–“β–ˆβ–ˆβ–’ β–ˆβ–ˆ β–€β–ˆ   β–ˆ β–“  β–ˆβ–ˆβ–’ β–“β–’β–“β–ˆ   β–€ β–“β–ˆβ–ˆ β–’ β–ˆβ–ˆβ–’
β–’β–“β–ˆ    β–„β–“β–ˆβ–ˆ  β–ˆβ–’β–‘β–’β–ˆβ–ˆβ–ˆ   β–’β–ˆβ–ˆβ–€β–€β–ˆβ–ˆβ–‘β–“β–ˆβ–ˆ  β–’β–ˆβ–ˆβ–‘β–“β–ˆβ–ˆ  β–€β–ˆ β–ˆβ–ˆβ–’β–’ β–“β–ˆβ–ˆβ–‘ β–’β–‘β–’β–ˆβ–ˆβ–ˆ   β–“β–ˆβ–ˆ β–‘β–„β–ˆ β–’
β–’β–“β–“β–„ β–„β–ˆβ–ˆβ–’β–’β–ˆβ–ˆ β–ˆβ–‘β–‘β–’β–“β–ˆ  β–„ β–‘β–“β–ˆ β–‘β–ˆβ–ˆ β–“β–“β–ˆ  β–‘β–ˆβ–ˆβ–‘β–“β–ˆβ–ˆβ–’  β–β–Œβ–ˆβ–ˆβ–’β–‘ β–“β–ˆβ–ˆβ–“ β–‘ β–’β–“β–ˆ  β–„ β–’β–ˆβ–ˆβ–€β–€β–ˆβ–„  
β–’ β–“β–ˆβ–ˆβ–ˆβ–€ β–‘ β–’β–€β–ˆβ–‘  β–‘β–’β–ˆβ–ˆβ–ˆβ–ˆβ–’β–‘β–“β–ˆβ–’β–‘β–ˆβ–ˆβ–“β–’β–’β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–“ β–’β–ˆβ–ˆβ–‘   β–“β–ˆβ–ˆβ–‘  β–’β–ˆβ–ˆβ–’ β–‘ β–‘β–’β–ˆβ–ˆβ–ˆβ–ˆβ–’β–‘β–ˆβ–ˆβ–“ β–’β–ˆβ–ˆβ–’
β–‘ β–‘β–’ β–’  β–‘ β–‘ ▐░  β–‘β–‘ β–’β–‘ β–‘ β–’ β–‘β–‘β–’β–‘β–’β–‘β–’β–“β–’ β–’ β–’ β–‘ β–’β–‘   β–’ β–’   β–’ β–‘β–‘   β–‘β–‘ β–’β–‘ β–‘β–‘ β–’β–“ β–‘β–’β–“β–‘
  β–‘  β–’    β–‘ β–‘β–‘   β–‘ β–‘  β–‘ β–’ β–‘β–’β–‘ β–‘β–‘β–‘β–’β–‘ β–‘ β–‘ β–‘ β–‘β–‘   β–‘ β–’β–‘    β–‘     β–‘ β–‘  β–‘  β–‘β–’ β–‘ β–’β–‘
β–‘           β–‘β–‘     β–‘    β–‘  β–‘β–‘ β–‘ β–‘β–‘β–‘ β–‘ β–‘    β–‘   β–‘ β–‘   β–‘         β–‘     β–‘β–‘   β–‘ 
β–‘ β–‘          β–‘     β–‘  β–‘ β–‘  β–‘  β–‘   β–‘              β–‘             β–‘  β–‘   β–‘     
β–‘           β–‘                                                               
   CVE-2024-50603                      @th3gokul & @th3sanjai

[Description]: Vulnerability Detection and Exploitation tool for CVE-2024-34102

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     [INF]: Specify a URL or domain for vulnerability detection
  -l LIST, --list LIST  [INF]: Specify a list of URLs for vulnerability detection
  -t THREADS, --threads THREADS
                        [INF]: Number of threads for list of URLs
  -proxy PROXY, --proxy PROXY
                        [INF]: Proxy URL to send request via your proxy
  -v, --verbose         [INF]: Increases verbosity of output in console
  -o OUTPUT, --output OUTPUT
                        [INF]: Filename to save output of vulnerable target]

Reference

https://www.securing.pl/en/cve-2024-50603-aviatrix-network-controller-command-injection-vulnerability/

About:

The CVEHunter tool is an exploitation tool for CVE-2024-34102 and the Devlopers of the tool are

and We specially Thank bebik and his SSRF tool which helped in our research and exploitation on CVE-2024-50603 to know the callbacks, pings and find accurate results while exploiting this vulnerability, We appreciate him for the great contribution for Open Source Community.

Disclaimer

The tool βš’οΈ is only for education πŸ“– and ethical purpose only and Developers are not responsible for any illegal exploitations.

About

CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages