From acc9940cdb15f3d10698ddd9bae27a2a0b6121b4 Mon Sep 17 00:00:00 2001 From: jenkins-metasploit Date: Fri, 15 Nov 2024 14:30:41 +0000 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 66 +++++++++++++++++++++++++++++++++++ 1 file changed, 66 insertions(+) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 25b89852f1aa..a951009f9053 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -80784,6 +80784,72 @@ "session_types": false, "needs_cleanup": null }, + "exploit_linux/http/pyload_js2py_cve_2024_39205": { + "name": "Pyload RCE (CVE-2024-39205) with js2py sandbox escape (CVE-2024-28397)", + "fullname": "exploit/linux/http/pyload_js2py_cve_2024_39205", + "aliases": [ + + ], + "rank": 600, + "disclosure_date": "2024-10-28", + "type": "exploit", + "author": [ + "Marven11", + "Spencer McIntyre", + "jheysel-r7" + ], + "description": "CVE-2024-28397 is sandbox escape in js2py (<=0.74) which is a popular python package that can evaluate\n javascript code inside a python interpreter. The vulnerability allows for an attacker to obtain a reference\n to a python object in the js2py environment enabling them to escape the sandbox, bypass pyimport restrictions\n and execute arbitrary commands on the host. At the time of writing no patch has been released, version 0.74\n is the latest version of js2py which was released Nov 6, 2022.\n\n CVE-2024-39205 is an remote code execution vulnerability in Pyload (<=0.5.0b3.dev85) which is an open-source\n download manager designed to automate file downloads from various online sources. Pyload is vulnerable because\n it exposes the vulnerable js2py functionality mentioned above on the /flash/addcrypted2 API endpoint.\n This endpoint was designed to only accept connections from localhost but by manipulating the HOST header we\n can bypass this restriction in order to access the API to achieve unauth RCE.", + "references": [ + "CVE-2024-39205", + "CVE-2024-28397", + "URL-https://github.com/Marven11/CVE-2024-39205-Pyload-RCE", + "URL-https://github.com/pyload/pyload/security/advisories/GHSA-w7hq-f2pj-c53g", + "URL-https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape" + ], + "platform": "Linux,Unix", + "arch": "cmd, x86, x64", + "rport": 9666, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": [ + "Unix Command", + "Linux Dropper" + ], + "mod_time": "2024-11-14 12:47:35 +0000", + "path": "/modules/exploits/linux/http/pyload_js2py_cve_2024_39205.rb", + "is_install_path": true, + "ref_name": "linux/http/pyload_js2py_cve_2024_39205", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "Reliability": [ + "repeatable-session" + ], + "SideEffects": [ + "ioc-in-logs", + "artifacts-on-disk" + ] + }, + "session_types": false, + "needs_cleanup": null + }, "exploit_linux/http/pyload_js2py_exec": { "name": "pyLoad js2py Python Execution", "fullname": "exploit/linux/http/pyload_js2py_exec",