Share
## https://sploitus.com/exploit?id=BBC0D5F1-97A7-51FA-9389-4A34E14D02FB
# CVE-2024-7928: FastAdmin < V1.3.4.20220530 Arbitrary File Reading Vulnerability
CVEHunter tool for vulnerability detection and exploit to retrieve DB details for FastAdmin instances for CVE-2024-7928 with accuracy and asynchronous concurrency than other poc's.

<h1 align="center">
  <img src="https://github.com/user-attachments/assets/ab1e9697-d78b-47d9-aff7-279394b90ea4" width="2000px">
  <br>
</h1>


### Installation

```bash
git clone https://github.com/th3gokul/CVE-2024-7928.git
cd CVE-2024-7928
pip install -r requirements.txt
python3 cvehunter.py --help
```
### Usage
```bash
β”Œβ”€β”€(rootγ‰Ώth3gokul)-[CVE-2024-7928]
└─# python3 cvehunter.py -h

 β–„β–ˆβ–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–’   β–ˆβ–“β–“β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆβ–‘ β–ˆβ–ˆ  β–ˆ    β–ˆβ–ˆ  β–ˆβ–ˆβ–ˆβ–„    β–ˆ β–„β–„β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–“β–“β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆβ–€β–ˆβ–ˆβ–ˆ  
β–’β–ˆβ–ˆβ–€ β–€β–ˆβ–“β–ˆβ–ˆβ–‘   β–ˆβ–’β–“β–ˆ   β–€ β–“β–ˆβ–ˆβ–‘ β–ˆβ–ˆβ–’ β–ˆβ–ˆ  β–“β–ˆβ–ˆβ–’ β–ˆβ–ˆ β–€β–ˆ   β–ˆ β–“  β–ˆβ–ˆβ–’ β–“β–’β–“β–ˆ   β–€ β–“β–ˆβ–ˆ β–’ β–ˆβ–ˆβ–’
β–’β–“β–ˆ    β–„β–“β–ˆβ–ˆ  β–ˆβ–’β–‘β–’β–ˆβ–ˆβ–ˆ   β–’β–ˆβ–ˆβ–€β–€β–ˆβ–ˆβ–‘β–“β–ˆβ–ˆ  β–’β–ˆβ–ˆβ–‘β–“β–ˆβ–ˆ  β–€β–ˆ β–ˆβ–ˆβ–’β–’ β–“β–ˆβ–ˆβ–‘ β–’β–‘β–’β–ˆβ–ˆβ–ˆ   β–“β–ˆβ–ˆ β–‘β–„β–ˆ β–’
β–’β–“β–“β–„ β–„β–ˆβ–ˆβ–’β–’β–ˆβ–ˆ β–ˆβ–‘β–‘β–’β–“β–ˆ  β–„ β–‘β–“β–ˆ β–‘β–ˆβ–ˆ β–“β–“β–ˆ  β–‘β–ˆβ–ˆβ–‘β–“β–ˆβ–ˆβ–’  β–β–Œβ–ˆβ–ˆβ–’β–‘ β–“β–ˆβ–ˆβ–“ β–‘ β–’β–“β–ˆ  β–„ β–’β–ˆβ–ˆβ–€β–€β–ˆβ–„  
β–’ β–“β–ˆβ–ˆβ–ˆβ–€ β–‘ β–’β–€β–ˆβ–‘  β–‘β–’β–ˆβ–ˆβ–ˆβ–ˆβ–’β–‘β–“β–ˆβ–’β–‘β–ˆβ–ˆβ–“β–’β–’β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–“ β–’β–ˆβ–ˆβ–‘   β–“β–ˆβ–ˆβ–‘  β–’β–ˆβ–ˆβ–’ β–‘ β–‘β–’β–ˆβ–ˆβ–ˆβ–ˆβ–’β–‘β–ˆβ–ˆβ–“ β–’β–ˆβ–ˆβ–’
β–‘ β–‘β–’ β–’  β–‘ β–‘ ▐░  β–‘β–‘ β–’β–‘ β–‘ β–’ β–‘β–‘β–’β–‘β–’β–‘β–’β–“β–’ β–’ β–’ β–‘ β–’β–‘   β–’ β–’   β–’ β–‘β–‘   β–‘β–‘ β–’β–‘ β–‘β–‘ β–’β–“ β–‘β–’β–“β–‘
  β–‘  β–’    β–‘ β–‘β–‘   β–‘ β–‘  β–‘ β–’ β–‘β–’β–‘ β–‘β–‘β–‘β–’β–‘ β–‘ β–‘ β–‘ β–‘β–‘   β–‘ β–’β–‘    β–‘     β–‘ β–‘  β–‘  β–‘β–’ β–‘ β–’β–‘
β–‘           β–‘β–‘     β–‘    β–‘  β–‘β–‘ β–‘ β–‘β–‘β–‘ β–‘ β–‘    β–‘   β–‘ β–‘   β–‘         β–‘     β–‘β–‘   β–‘ 
β–‘ β–‘          β–‘     β–‘  β–‘ β–‘  β–‘  β–‘   β–‘              β–‘             β–‘  β–‘   β–‘     
β–‘           β–‘                                                               
    CVE-2024-7928                      @th3gokul

[Description]: Vulnerability Detection and Exploitation tool for CVE-2024-7928

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     [INF]: Specify a URL or domain for vulnerability detection
  -l LIST, --list LIST  [INF]: Specify a list of URLs for vulnerability detection
  -t THREADS, --threads THREADS
                        [INF]: Number of threads for list of URLs
  -proxy PROXY, --proxy PROXY
                        [INF]: Proxy URL to send request via your proxy
  -v, --verbose         [INF]: Increases verbosity of output in console
  -o OUTPUT, --output OUTPUT
                        [INF]: Filename to save output of vulnerable target

```
### About
The tool is Developed by th3Gokul to detect and exploit retrieve DB details for FastAdmin instances tool for CVE-2024-7928.

### Disclaimer
The πŸ”¨ tool is only for education and ethical purpose only and Developers are not responsible for any illegal exploitations.