cve/2023/CVE-2023-0297.md

41 lines
1.7 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-0297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0297)
![](https://img.shields.io/static/v1?label=Product&message=pyload%2Fpyload&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%200.5.0b3.dev31%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code&color=brighgreen)
### Description
Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
### POC
#### Reference
- http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html
- http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html
- https://huntr.dev/bounties/3fd606f7-83e1-4265-b083-2e1889a05e65
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Acaard/HTB-PC
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/top
- https://github.com/Fanxiaoyao66/Hack-The-Box-PC
- https://github.com/JacobEbben/CVE-2023-0297
- https://github.com/R4be1/Vulnerability-reports-on-two-websites-affiliated-with-the-European-Union
- https://github.com/Small-ears/CVE-2023-0297
- https://github.com/b11y/CVE-2023-0297
- https://github.com/bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad
- https://github.com/bAuh0lz/Vulnerabilities
- https://github.com/gudetem/CVE-2023-0297
- https://github.com/hktalent/TOP
- https://github.com/jonasw234/attackerkb_checker
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/linuskoester/writeups
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/overgrowncarrot1/CVE-2023-0297
- https://github.com/sota70/PC-Easy-Writeup
2024-05-28 08:49:17 +00:00
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
2024-05-25 21:48:12 +02:00