Skip to content

WTN-arny/CVE-2024-37085

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

CVE-2024-37085          Hits


unauthenticated shell upload to full administrator on domain-joined esxi hypervisors.

Details:

an authentication bypass which leads to shell upload in context of vpxuser leading to full administrative permission on domain-joined ESXI hypervisors.
in order to exploit this vulnerability the ESXI shell must to enabled.

Exploit:

The exploitation of this vulnerability needs to perform few steps in order to acheive full administrator controll.
which all the steps are handled by a single python script.
to exploit this vuln you need to chose the methods which are used in this script
with the --full or -f argument the script will try to get a shell with full administrative permissions
and if the --dc or -d argument is not provided then the script, will only upload a shell to the target
if the argmunet for shell is provided (--shel or -s) if not provided then it'll use the default shell
which you can execute command with post request using param cmd=[command].

python3.10 and above are requiered.
this script doesnt supports multithreadin for some reasons

Info:

as usaul I asking you, before buying or even considering to buy, make sure to verify the DOWNLOAD links provided here via this email: etx_arny@proton.me
and also upon the request I will provide prove.
but dont ask me to send you the script before making the payment, or sending your specific target to test it for you and/or give you shell
Other payment methods are support via the email, including XMR

Note:

Limited copies are provided for now, price change and/or suspension of sells are possible.

Todo:

  • Adding multithreading functionality.
  • Writting a complete analyze.
  • Check if target is vulnerable and save it to file.

My Other Works:

if your interrested in my other works here is the latest which I still consider selling
full configuration and after purchase service is offered with this exploit.

Magento --> CVE-2024-34102

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published