PoC-in-GitHub/2020/CVE-2020-9484.json

163 lines
6.1 KiB
JSON
Raw Normal View History

2020-05-21 12:11:06 +09:00
[
2020-07-25 18:08:25 +09:00
{
"id": 265151514,
"name": "tomcat-cluster-session-sync-exp",
"full_name": "threedr3am\/tomcat-cluster-session-sync-exp",
"owner": {
"login": "threedr3am",
"id": 19884279,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/19884279?v=4",
"html_url": "https:\/\/github.com\/threedr3am"
},
"html_url": "https:\/\/github.com\/threedr3am\/tomcat-cluster-session-sync-exp",
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
2020-07-30 18:08:38 +09:00
"updated_at": "2020-07-30T04:48:18Z",
2020-07-25 18:08:25 +09:00
"pushed_at": "2020-05-19T05:13:19Z",
2020-07-30 18:08:38 +09:00
"stargazers_count": 187,
"watchers_count": 187,
2020-07-25 18:08:25 +09:00
"forks_count": 33,
"forks": 33,
2020-07-30 18:08:38 +09:00
"watchers": 187,
2020-07-25 18:08:25 +09:00
"score": 0
},
{
"id": 265717610,
"name": "CVE-2020-9484",
"full_name": "masahiro331\/CVE-2020-9484",
"owner": {
"login": "masahiro331",
"id": 20438853,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20438853?v=4",
"html_url": "https:\/\/github.com\/masahiro331"
},
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2020-9484",
"description": null,
"fork": false,
"created_at": "2020-05-21T00:41:06Z",
2020-08-01 00:09:36 +09:00
"updated_at": "2020-07-31T13:02:35Z",
2020-07-25 18:08:25 +09:00
"pushed_at": "2020-05-21T10:15:35Z",
2020-08-01 00:09:36 +09:00
"stargazers_count": 72,
"watchers_count": 72,
2020-07-25 18:08:25 +09:00
"forks_count": 19,
"forks": 19,
2020-08-01 00:09:36 +09:00
"watchers": 72,
2020-07-25 18:08:25 +09:00
"score": 0
},
{
"id": 265735756,
"name": "CVE-2020-9484",
"full_name": "FiveAourThe\/CVE-2020-9484",
"owner": {
"login": "FiveAourThe",
"id": 38708428,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38708428?v=4",
"html_url": "https:\/\/github.com\/FiveAourThe"
},
"html_url": "https:\/\/github.com\/FiveAourThe\/CVE-2020-9484",
"description": "利用ceye批量检测CVE-2020-9484",
"fork": false,
"created_at": "2020-05-21T02:30:37Z",
2020-07-30 18:08:38 +09:00
"updated_at": "2020-07-30T04:39:44Z",
2020-07-25 18:08:25 +09:00
"pushed_at": "2020-05-21T02:30:47Z",
2020-07-30 18:08:38 +09:00
"stargazers_count": 7,
"watchers_count": 7,
2020-07-25 18:08:25 +09:00
"forks_count": 8,
"forks": 8,
2020-07-30 18:08:38 +09:00
"watchers": 7,
2020-07-25 18:08:25 +09:00
"score": 0
},
{
"id": 265870392,
"name": "CVE-2020-9484",
"full_name": "IdealDreamLast\/CVE-2020-9484",
"owner": {
"login": "IdealDreamLast",
"id": 33090510,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33090510?v=4",
"html_url": "https:\/\/github.com\/IdealDreamLast"
},
"html_url": "https:\/\/github.com\/IdealDreamLast\/CVE-2020-9484",
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
"fork": false,
"created_at": "2020-05-21T14:30:46Z",
"updated_at": "2020-07-05T04:37:58Z",
"pushed_at": "2020-05-21T15:13:22Z",
"stargazers_count": 41,
"watchers_count": 41,
2020-07-31 06:09:46 +09:00
"forks_count": 21,
"forks": 21,
2020-07-25 18:08:25 +09:00
"watchers": 41,
"score": 0
},
{
"id": 269379345,
"name": "CVE-2020-9484",
"full_name": "qerogram\/CVE-2020-9484",
"owner": {
"login": "qerogram",
"id": 29586629,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29586629?v=4",
"html_url": "https:\/\/github.com\/qerogram"
},
"html_url": "https:\/\/github.com\/qerogram\/CVE-2020-9484",
"description": "for Ubuntu 18.04, improve functions.",
"fork": false,
"created_at": "2020-06-04T14:19:12Z",
"updated_at": "2020-06-04T18:12:20Z",
"pushed_at": "2020-06-04T18:12:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 269770630,
"name": "CVE-2020-9484-Mass-Scan",
"full_name": "osamahamad\/CVE-2020-9484-Mass-Scan",
"owner": {
"login": "osamahamad",
"id": 59566963,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/59566963?v=4",
"html_url": "https:\/\/github.com\/osamahamad"
},
"html_url": "https:\/\/github.com\/osamahamad\/CVE-2020-9484-Mass-Scan",
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
"fork": false,
"created_at": "2020-06-05T20:40:28Z",
"updated_at": "2020-07-18T11:34:11Z",
"pushed_at": "2020-06-05T21:04:43Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
},
2020-06-09 18:08:01 +09:00
{
"id": 270900495,
"name": "CVE-2020-9484-Scanner",
"full_name": "DeviantSec\/CVE-2020-9484-Scanner",
"owner": {
"login": "DeviantSec",
"id": 48874057,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/48874057?v=4",
"html_url": "https:\/\/github.com\/DeviantSec"
},
"html_url": "https:\/\/github.com\/DeviantSec\/CVE-2020-9484-Scanner",
"description": "A smol bash script I threw together pretty quickly to scan for vulnerable versions of the Apache Tomcat RCE. I'll give it some love when I have the time. ",
"fork": false,
"created_at": "2020-06-09T04:13:51Z",
2020-06-10 18:07:55 +09:00
"updated_at": "2020-06-10T07:08:19Z",
"pushed_at": "2020-06-10T07:08:17Z",
2020-06-10 00:07:57 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2020-06-09 18:08:01 +09:00
"forks_count": 0,
"forks": 0,
2020-06-10 00:07:57 +09:00
"watchers": 1,
2020-06-09 18:08:01 +09:00
"score": 0
2020-05-21 12:11:06 +09:00
}
]