Closed WX-T closed 7 years ago
有具体的参数 选项或者PoC 可以提供复现么?
#!/usr/bin/python
# -*- coding: utf-8 -*-
# If you have issues about development, please read:
# https://github.com/knownsec/Pocsuite/blob/master/docs/CODING.md
# https://github.com/knownsec/Pocsuite/blob/master/docs/COPYING
import pymongo
from dummy import *
from pocsuite.poc import POCBase, Output
from pocsuite.utils import register
class TestPOC(POCBase):
name = 'MongoDB未授权访问'
vulID = '78176' # https://www.seebug.org/vuldb/ssvid-78176
author = ['aaa']
vulType = 'unauth'
version = '1.0' # default version: 1.0
references = ['http://www.s3cur1ty.de/m1adv2013-003']
desc = '''未授权'''
vulDate = '2013-02-14'
createDate = '2013-02-14'
updateDate = '2013-02-14'
appName = 'MongoDB未授权'
appVersion = '无'
appPowerLink = ''
samples = ['']
def _attack(self):
'''attack mode'''
return self._verify()
def _verify(self):
'''verify mode'''
result = {}
try:
port = 27017
connection = pymongo.MongoClient(self.target,port,socketTimeoutMS=3000)
dbs = connection.database_names()
except Exception as e:
result = {}
if dbs:
result['VerifyInfo'] = {}
result['VerifyInfo']['URL'] = '%s:%i存在MongoDB未授权' %(self.target,port)
return self.parse_output(result)
def parse_output(self, result):
output = Output(self)
if result:
output.success(result)
else:
output.fail('失败')
return output
register(TestPOC)
mongodb未授权访问漏洞,IP列表在文件中有十个左右,其中只有一个存在该漏洞,设置10个进程,前九个扫描速度非常快速,第10个速度很慢,您看一下是写的POC有问题吗
调用方式及参数呢?
已经复现及找到最优解决办法, 提交 MR
OS / Software Version
uname -a
result hereHow to reproduce the issue ?