19 lines
1017 B
Markdown
19 lines
1017 B
Markdown
|
|
### [CVE-2011-10017](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-10017)
|
||
|
|

|
||
|
|

|
||
|
|
&color=brightgreen)
|
||
|
|
|
||
|
|
### Description
|
||
|
|
|
||
|
|
Snort Report versions < 1.3.2 contains a remote command execution vulnerability in the nmap.php and nbtscan.php scripts. These scripts fail to properly sanitize user input passed via the target GET parameter, allowing attackers to inject arbitrary shell commands. Exploitation requires no authentication and can result in full compromise of the underlying system.
|
||
|
|
|
||
|
|
### POC
|
||
|
|
|
||
|
|
#### Reference
|
||
|
|
- https://www.exploit-db.com/exploits/17947
|
||
|
|
- https://www.vulncheck.com/advisories/snort-report-rce
|
||
|
|
|
||
|
|
#### Github
|
||
|
|
No PoCs found on GitHub currently.
|
||
|
|
|