### [CVE-2021-43857](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43857) ![](https://img.shields.io/static/v1?label=Product&message=Gerapy&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen) ### Description Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8. ### POC #### Reference - http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ChamalBandara/CVEs - https://github.com/Enes4xd/Enes4xd - https://github.com/LongWayHomie/CVE-2021-43857 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/cr0ss2018/cr0ss2018 - https://github.com/ezelnur6327/Enes4xd - https://github.com/ezelnur6327/ezelnur6327 - https://github.com/lowkey0808/CVE-2021-43857 - https://github.com/ltfafei/ltfafei - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit - https://github.com/zecool/cve