cve/2024/CVE-2024-45256.md
2024-08-27 19:05:50 +00:00

19 lines
837 B
Markdown

### [CVE-2024-45256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45256)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An arbitrary file write issue in the exfiltration endpoint in BYOB (Build Your Own Botnet) 2.0 allows attackers to overwrite SQLite databases and bypass authentication via an unauthenticated HTTP request with a crafted parameter. This occurs in file_add in api/files/routes.py.
### POC
#### Reference
- https://blog.chebuya.com/posts/unauthenticated-remote-command-execution-on-byob/
- https://github.com/chebuya/exploits/tree/main/BYOB-RCE
#### Github
No PoCs found on GitHub currently.