Skip to content

Commit acc9940

Browse files
author
jenkins-metasploit
committedNov 15, 2024·
automatic module_metadata_base.json update
1 parent 5d9add4 commit acc9940

File tree

1 file changed

+66
-0
lines changed

1 file changed

+66
-0
lines changed
 

‎db/modules_metadata_base.json

Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80784,6 +80784,72 @@
8078480784
"session_types": false,
8078580785
"needs_cleanup": null
8078680786
},
80787+
"exploit_linux/http/pyload_js2py_cve_2024_39205": {
80788+
"name": "Pyload RCE (CVE-2024-39205) with js2py sandbox escape (CVE-2024-28397)",
80789+
"fullname": "exploit/linux/http/pyload_js2py_cve_2024_39205",
80790+
"aliases": [
80791+
80792+
],
80793+
"rank": 600,
80794+
"disclosure_date": "2024-10-28",
80795+
"type": "exploit",
80796+
"author": [
80797+
"Marven11",
80798+
"Spencer McIntyre",
80799+
"jheysel-r7"
80800+
],
80801+
"description": "CVE-2024-28397 is sandbox escape in js2py (<=0.74) which is a popular python package that can evaluate\n javascript code inside a python interpreter. The vulnerability allows for an attacker to obtain a reference\n to a python object in the js2py environment enabling them to escape the sandbox, bypass pyimport restrictions\n and execute arbitrary commands on the host. At the time of writing no patch has been released, version 0.74\n is the latest version of js2py which was released Nov 6, 2022.\n\n CVE-2024-39205 is an remote code execution vulnerability in Pyload (<=0.5.0b3.dev85) which is an open-source\n download manager designed to automate file downloads from various online sources. Pyload is vulnerable because\n it exposes the vulnerable js2py functionality mentioned above on the /flash/addcrypted2 API endpoint.\n This endpoint was designed to only accept connections from localhost but by manipulating the HOST header we\n can bypass this restriction in order to access the API to achieve unauth RCE.",
80802+
"references": [
80803+
"CVE-2024-39205",
80804+
"CVE-2024-28397",
80805+
"URL-https://github.com/Marven11/CVE-2024-39205-Pyload-RCE",
80806+
"URL-https://github.com/pyload/pyload/security/advisories/GHSA-w7hq-f2pj-c53g",
80807+
"URL-https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape"
80808+
],
80809+
"platform": "Linux,Unix",
80810+
"arch": "cmd, x86, x64",
80811+
"rport": 9666,
80812+
"autofilter_ports": [
80813+
80,
80814+
8080,
80815+
443,
80816+
8000,
80817+
8888,
80818+
8880,
80819+
8008,
80820+
3000,
80821+
8443
80822+
],
80823+
"autofilter_services": [
80824+
"http",
80825+
"https"
80826+
],
80827+
"targets": [
80828+
"Unix Command",
80829+
"Linux Dropper"
80830+
],
80831+
"mod_time": "2024-11-14 12:47:35 +0000",
80832+
"path": "/modules/exploits/linux/http/pyload_js2py_cve_2024_39205.rb",
80833+
"is_install_path": true,
80834+
"ref_name": "linux/http/pyload_js2py_cve_2024_39205",
80835+
"check": true,
80836+
"post_auth": false,
80837+
"default_credential": false,
80838+
"notes": {
80839+
"Stability": [
80840+
"crash-safe"
80841+
],
80842+
"Reliability": [
80843+
"repeatable-session"
80844+
],
80845+
"SideEffects": [
80846+
"ioc-in-logs",
80847+
"artifacts-on-disk"
80848+
]
80849+
},
80850+
"session_types": false,
80851+
"needs_cleanup": null
80852+
},
8078780853
"exploit_linux/http/pyload_js2py_exec": {
8078880854
"name": "pyLoad js2py Python Execution",
8078980855
"fullname": "exploit/linux/http/pyload_js2py_exec",

0 commit comments

Comments
 (0)
Please sign in to comment.