PoC-in-GitHub/2020/CVE-2020-9484.json
2022-12-29 21:20:58 +09:00

234 lines
No EOL
8.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 265151514,
"name": "tomcat-cluster-session-sync-exp",
"full_name": "threedr3am\/tomcat-cluster-session-sync-exp",
"owner": {
"login": "threedr3am",
"id": 19884279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19884279?v=4",
"html_url": "https:\/\/github.com\/threedr3am"
},
"html_url": "https:\/\/github.com\/threedr3am\/tomcat-cluster-session-sync-exp",
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
"updated_at": "2022-11-22T17:23:42Z",
"pushed_at": "2020-05-19T05:13:19Z",
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 213,
"score": 0
},
{
"id": 265717610,
"name": "CVE-2020-9484",
"full_name": "masahiro331\/CVE-2020-9484",
"owner": {
"login": "masahiro331",
"id": 20438853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
"html_url": "https:\/\/github.com\/masahiro331"
},
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2020-9484",
"description": null,
"fork": false,
"created_at": "2020-05-21T00:41:06Z",
"updated_at": "2022-12-22T18:57:35Z",
"pushed_at": "2021-10-28T02:31:04Z",
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 126,
"score": 0
},
{
"id": 265741960,
"name": "CVE-2020-9484",
"full_name": "seanachao\/CVE-2020-9484",
"owner": {
"login": "seanachao",
"id": 30539692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30539692?v=4",
"html_url": "https:\/\/github.com\/seanachao"
},
"html_url": "https:\/\/github.com\/seanachao\/CVE-2020-9484",
"description": "利用ceye批量检测CVE-2020-9484",
"fork": false,
"created_at": "2020-05-21T03:07:24Z",
"updated_at": "2022-03-23T08:03:58Z",
"pushed_at": "2020-05-21T02:30:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 265870392,
"name": "CVE-2020-9484",
"full_name": "IdealDreamLast\/CVE-2020-9484",
"owner": {
"login": "IdealDreamLast",
"id": 33090510,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33090510?v=4",
"html_url": "https:\/\/github.com\/IdealDreamLast"
},
"html_url": "https:\/\/github.com\/IdealDreamLast\/CVE-2020-9484",
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
"fork": false,
"created_at": "2020-05-21T14:30:46Z",
"updated_at": "2022-11-09T18:07:50Z",
"pushed_at": "2020-05-21T15:13:22Z",
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 50,
"score": 0
},
{
"id": 269379345,
"name": "CVE-2020-9484",
"full_name": "qerogram\/CVE-2020-9484",
"owner": {
"login": "qerogram",
"id": 29586629,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29586629?v=4",
"html_url": "https:\/\/github.com\/qerogram"
},
"html_url": "https:\/\/github.com\/qerogram\/CVE-2020-9484",
"description": "for Ubuntu 18.04, improve functions.",
"fork": false,
"created_at": "2020-06-04T14:19:12Z",
"updated_at": "2022-02-23T07:05:46Z",
"pushed_at": "2020-06-04T18:12:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 269770630,
"name": "CVE-2020-9484-Mass-Scan",
"full_name": "osamahamad\/CVE-2020-9484-Mass-Scan",
"owner": {
"login": "osamahamad",
"id": 59566963,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59566963?v=4",
"html_url": "https:\/\/github.com\/osamahamad"
},
"html_url": "https:\/\/github.com\/osamahamad\/CVE-2020-9484-Mass-Scan",
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
"fork": false,
"created_at": "2020-06-05T20:40:28Z",
"updated_at": "2022-11-09T18:08:02Z",
"pushed_at": "2020-06-05T21:04:43Z",
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 31,
"score": 0
},
{
"id": 582992941,
"name": "CVE-2022-23181",
"full_name": "Live-Hack-CVE\/CVE-2022-23181",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23181",
"description": "The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-28T12:55:49Z",
"updated_at": "2022-12-28T12:55:50Z",
"pushed_at": "2022-12-28T12:55:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 583112862,
"name": "CVE-2021-25329",
"full_name": "Live-Hack-CVE\/CVE-2021-25329",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-25329",
"description": "The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequi CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-28T20:02:36Z",
"updated_at": "2022-12-28T20:02:36Z",
"pushed_at": "2022-12-28T20:02:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]