支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%
一、 漏洞 CVE-2024-28397 基础信息
漏洞信息
                                        # N/A

## 漏洞概述
js2py组件中的js2py.disable_pyimport()函数存在安全问题,攻击者可以通过精心构造的API调用来执行任意代码。

## 影响版本
影响版本为js2py v0.74及之前版本。

## 漏洞细节
在js2py.disable_pyimport()函数中存在一个漏洞,该漏洞允许攻击者通过特定的API调用执行任意代码。

## 漏洞影响
攻击者可能利用此漏洞执行任意代码,这可能导致严重的安全问题,包括数据泄露、系统受损等。
                                        
神龙判断

是否为 Web 类漏洞:

判断理由:

是。这个漏洞存在于js2py组件的js2py.disable_pyimport()函数中,影响js2py版本至0.74。攻击者可以通过精心构造的API调用来执行任意代码,这表明这是一个服务端的漏洞,因为漏洞存在于服务器端的组件中,且可能导致服务器执行不受信任的代码。
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
Js2Py 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Js2Py是Python基金会的一个库。用于将 JavaScript 转换为 Python 代码。 Js2Py 0.74 及之前版本存在安全漏洞,该漏洞源于组件 js2py.disable_pyimport() 中存在一个问题,攻击者利用该漏洞可以通过精心设计的 API 调用执行任意代码。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2024-28397 的公开POC
#POC 描述源链接神龙链接
1to be releasedhttps://github.com/Marven11/CVE-2024-28397POC详情
2CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-EscapePOC详情
3Nonehttps://github.com/CYBER-WARRIOR-SEC/CVE-2024-28397-js2py-Sandbox-EscapePOC详情
4An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-28397.yamlPOC详情
5This vulnerability arises from incomplete sandboxing in js2py, where crafted JavaScript can traverse Python’s internal object model and access dangerous classes like subprocess.Popen, leading to arbitrary command execution.https://github.com/waleed-hassan569/CVE-2024-28397-command-execution-pocPOC详情
6The CVE-2024-28397 vulnerability affects versions of js2py up to v0.74, a Python library that allows JavaScript code to be executed within the Python interpreter. https://github.com/0timeday/exploit-js2pyPOC详情
7Nonehttps://github.com/harutomo-jp/CVE-2024-28397-RCEPOC详情
8Nonehttps://github.com/Naved124/CVE-2024-28397-js2py-Sandbox-EscapePOC详情
9The CVE-2024-28397 vulnerability affects versions of js2py up to v0.74, a Python library that allows JavaScript code to be executed within the Python interpreter. https://github.com/releaseown/exploit-js2pyPOC详情
10PoC exploit for CVE-2024-28397 – Remote Code Execution in pyload-ng via js2py sandbox escapehttps://github.com/ExtremeUday/Remote-Code-Execution-CVE-2024-28397-pyload-ng-js2py-POC详情
11This repository contains a python exploit code for CVE-2024-28397 intended for use on the "CodePartTwo" machine on Hack The Box (HTB).https://github.com/naclapor/CVE-2024-28397POC详情
12Nonehttps://github.com/0xDTC/js2py-Sandbox-Escape-CVE-2024-28397-RCEPOC详情
13This repository contains a Proof of Concept (PoC) for CVE-2024-28397, a vulnerability in the js2py library allowing a sandbox escape to achieve remote code execution.https://github.com/nelissandro/CVE-2024-28397-Js2Py-RCEPOC详情
14CVE-2024-28397 - Remote Code Execution From Vulnerable JS2PYhttps://github.com/vitaciminIPI/CVE-2024-28397-RCEPOC详情
15This vulnerability arises from incomplete sandboxing in js2py, where crafted JavaScript can traverse Python’s internal object model and access dangerous classes like subprocess.Popen, leading to arbitrary command execution.https://github.com/Ghost-Overflow/CVE-2024-28397-command-execution-pocPOC详情
16Reverse shell for CVE-2024-28397.https://github.com/0xPadme/CVE-2024-28397-Reverse-ShellPOC详情
17This repository contains a Proof of Concept (PoC) for CVE-2024-28397, a vulnerability in the js2py library allowing a sandbox escape to achieve remote code execution.https://github.com/D3ltaFormation/CVE-2024-28397-Js2Py-RCEPOC详情
18A Python automation script for exploiting the **js2py Sandbox Escape** vulnerability (CVE-2024-28397). This tool automates the payload generation and delivery process to achieve Remote Code Execution (RCE) on vulnerable instances.https://github.com/L1337Xi/CVE-2024-28397-Exploit-AutomationPOC详情
19This vulnerability arises from incomplete sandboxing in js2py, where crafted JavaScript can traverse Python’s internal object model and access dangerous classes like subprocess.Popen, leading to arbitrary command execution.https://github.com/GhostOverflow/CVE-2024-28397-command-execution-pocPOC详情
20js2py <= 0.74 sandbox escape (CVE-2024-28397)https://github.com/3z-p0wn/CVE-2024-28397-exploitPOC详情
三、漏洞 CVE-2024-28397 的情报信息
四、漏洞 CVE-2024-28397 的评论

暂无评论


发表评论