mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 11:06:19 +00:00
1.5 KiB
1.5 KiB
CVE-2020-7384
Description
Rapid7's Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim's machine.
POC
Reference
- http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html
- http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html
- http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html
- http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html
Github
- https://github.com/0xCarsonS/CVE-2020-7384
- https://github.com/ARPSyndicate/cvemon
- https://github.com/cocomelonc/vulnexipy
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/justinsteven/advisories
- https://github.com/mrinalprakash45/Hack-The-Box_Script-Kiddie
- https://github.com/nikhil1232/CVE-2020-7384
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC