cve/2021/CVE-2021-43857.md

33 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-43857](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43857)
![](https://img.shields.io/static/v1?label=Product&message=Gerapy&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
### POC
#### Reference
- http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ChamalBandara/CVEs
- https://github.com/Enes4xd/Enes4xd
- https://github.com/LongWayHomie/CVE-2021-43857
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/cr0ss2018/cr0ss2018
- https://github.com/ezelnur6327/Enes4xd
- https://github.com/ezelnur6327/ezelnur6327
- https://github.com/lowkey0808/CVE-2021-43857
- https://github.com/ltfafei/ltfafei
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
- https://github.com/zecool/cve