snmpv1-community-detect-string: SNMPv1 Public Community String - Detect

日期: 2025-08-01 | 影响软件: SNMPv1 | POC: 已公开

漏洞描述

SNMPv1 was configured with the default public community string, which allows unauthorized users to query system information. This may expose sensitive details such as network configuration, running processes, and device information.

PoC代码[已公开]

id: snmpv1-community-detect-string

info:
  name: SNMPv1 Public Community String - Detect
  author: matejsmycka
  severity: high
  description: |
    SNMPv1 was configured with the default public community string, which allows unauthorized users to query system information. This may expose sensitive details such as network configuration, running processes, and device information.
  reference:
    - https://hackers-arise.com/exploiting-snmpv1-for-reconnaissance/
    - https://hacktricks.boitatech.com.br/pentesting/pentesting-snmp
    - https://www.tenable.com/plugins/nnm/1344
    - https://linux.die.net/man/1/snmpwalk
  metadata:
    verified: true
    max-request: 1
    shodan-query: product:"SNMP"
  tags: js,udp,network,snmp,vuln

javascript:
  - pre-condition: |
      isUDPPortOpen(Host, Port);

    code: |
      const c = require("nuclei/net");
      const conn = c.Open('udp', `${Host}:${Port}`, `${Timeout}`);
      let community_string =  bytes.NewBuffer();
      community_string.WriteString(Community);
      let payload = "30290201010406";
      payload += community_string.Hex();
      payload += "a01c02040eb376f4020100020100"
      payload += "300e300c06082b060102010105000500" // VarBind list for sysName.0
      conn.SendHex(payload);
      let resp = conn.RecvFull(64);
      resp;

    args:
      Host: "{{Host}}"
      Port: 161
      Timeout: 2
      Community: "{{community_string}}"

    attack: clusterbomb

    payloads:
      community_string:
        - public

    matchers:
      - type: binary
        binary:
          - "0201010406"

    extractors:
      - type: regex
        group: 1
        regex:
          - "public.*\x00\x04.(.*)"
# digest: 4a0a00473045022025ba13e97437a09d2aa612adf6a95225bf1cb7792fa9f06254ec7fd1d4c7b1100221009c30846f7c8928da30c7ac65aa232b3fe4c445fca490d368c1a99cb45cb06ac2:922c64590222798bb761d5b6d8e72950

相关漏洞推荐