cve/2024/CVE-2024-45256.md

19 lines
837 B
Markdown
Raw Normal View History

2024-08-26 18:34:01 +00:00
### [CVE-2024-45256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45256)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An arbitrary file write issue in the exfiltration endpoint in BYOB (Build Your Own Botnet) 2.0 allows attackers to overwrite SQLite databases and bypass authentication via an unauthenticated HTTP request with a crafted parameter. This occurs in file_add in api/files/routes.py.
### POC
#### Reference
- https://blog.chebuya.com/posts/unauthenticated-remote-command-execution-on-byob/
2024-08-27 19:05:50 +00:00
- https://github.com/chebuya/exploits/tree/main/BYOB-RCE
2024-08-26 18:34:01 +00:00
#### Github
No PoCs found on GitHub currently.