Arbitrary Network Traffic Execution via SSRF in Havoc 2.0.7
CVE-2024-41570
Key Information:
- Vendor
- Havoc 2
- Status
- Havoc
- Vendor
- CVE Published:
- 12 August 2024
Badges
Summary
An unauthenticated server-side request forgery (SSRF) vulnerability in the demon callback handling of Havoc 2 0.7 allows attackers to exploit the system by sending arbitrary network traffic originating from the team server. This flaw enables attackers to make requests from the server to any internal or external network service, posing a serious security risk for organizations utilizing Havoc. Attackers can potentially access sensitive information or further exploit other weaknesses in the network by leveraging this SSRF vulnerability.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved