Exploit for Improper Access Control in Appsmith
Discription

image
CVE‑2024‑55963 Appsmith RCE PoC PoC exploit for CVE‑2024‑55963 that runs arbitrary commands or spawns reverse shell on vulnerable Appsmith instances. It automatically handles both modern servers (with the environmentId feature) and much older “legacy” builds that pre‑date it, so you can use one script for every version from v1.20 up to the last vulnerable release v1.51. Quick start “`bash Run an arbitrary command (default is id) python3 appsmith-rce.py https://target.example.com [email protected] password123 "whoami" spawn a reverse shell python3 appsmith-rce.py https://target.example.com [email protected] password123 -revshell “` Note: Any credentials work as long as the server allows self‑service sign‑up. The script tries to log in first and falls back to registration if the account does not exist. How it works (high level) CSRF & session handling – pulls the token from several possible endpoints or the cookie jar, then carries it forward. Login/Signup flow – logs in or registers a new user with the provided email / password. Workspace discovery – grabs an existing workspace or triggers the onboarding flow to auto‑create one. Environment detection – queries /api/v1/environments/workspaces/{id}; if missing it switches to legacy mode (empty environmentId). Application & page setup – posts to /api/v1/applications and extracts pageId. Datasource creation – builds a local PostgreSQL datasource that points at localhost:5432 with postgres/postgres creds (allowed by the…Read More

Back to Main

Subscribe for the latest news: