mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-24 11:44:02 +02:00
1.9 KiB
1.9 KiB
CVE-2020-13151
Description
Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use a crafted UDF to execute arbitrary OS commands on all nodes of the cluster at the permission level of the user running the Aerospike service.
POC
Reference
- http://packetstormsecurity.com/files/160106/Aerospike-Database-5.1.0.3-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/160451/Aerospike-Database-UDF-Lua-Code-Execution.html
- https://b4ny4n.github.io/network-pentest/2020/08/01/cve-2020-13151-poc-aerospike.html
Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ByteMe1001/CVE-2020-13151-POC-Aerospike-Server-Host-Command-Execution-RCE-
- https://github.com/Faizan-Khanx/OSCP
- https://github.com/Mr-Tree-S/POC_EXP
- https://github.com/SexyBeast233/SecBooks
- https://github.com/b4ny4n/CVE-2020-13151
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/iandrade87br/OSCP
- https://github.com/manoj3768/OSCP
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/pranjalsharma03/OSCP
- https://github.com/promise2k/OSCP
- https://github.com/soosmile/POC
- https://github.com/xcode96/REDME
- https://github.com/xsudoxx/OSCP