cve/2024/CVE-2024-28397.md

35 lines
1.6 KiB
Markdown
Raw Normal View History

2024-06-22 09:37:59 +00:00
### [CVE-2024-28397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28397)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.
### POC
#### Reference
2024-08-27 19:05:50 +00:00
- https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape
2024-06-22 09:37:59 +00:00
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/0xDTC/js2py-Sandbox-Escape-CVE-2024-28397-RCE
- https://github.com/CYBER-WARRIOR-SEC/CVE-2024-28397-js2py-Sandbox-Escape
- https://github.com/ExtremeUday/Remote-Code-Execution-CVE-2024-28397-pyload-ng-js2py-
- https://github.com/Leilamag/CodeTwoRCEExploit
2024-06-22 09:37:59 +00:00
- https://github.com/Marven11/CVE-2024-28397
2024-08-10 19:04:30 +00:00
- https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape
2025-09-29 16:08:36 +00:00
- https://github.com/Marven11/CVE-2024-39205-Pyload-RCE
- https://github.com/Marven11/Marven11
- https://github.com/Naved124/CVE-2024-28397-js2py-Sandbox-Escape
- https://github.com/harutomo-jp/CVE-2024-28397-RCE
- https://github.com/kyl0-ST12/CVE_2024_28397---js2py-RCE
- https://github.com/naclapor/CVE-2024-28397
- https://github.com/nelissandro/CVE-2024-28397-Js2Py-RCE
2024-06-22 09:37:59 +00:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/releaseown/exploit-js2py
- https://github.com/vitaciminIPI/CVE-2024-28397-RCE
- https://github.com/waleed-hassan569/CVE-2024-28397-command-execution-poc
- https://github.com/zulloper/cve-poc
2024-06-22 09:37:59 +00:00