Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-32314 PoC — vm2 注入漏洞

Source
Associated Vulnerability
Title:vm2 注入漏洞 (CVE-2023-32314)
Description:vm2是捷克Patrik Simek个人开发者的一个 Node.js 的高级虚拟机/沙盒。以使用列入白名单的 Node 内置模块运行不受信任的代码。 vm2 3.9.17 及之前版本存在注入漏洞,该漏洞源于可以使用 Node 的内置模块运行不受信任的代码。
Description
This Repository Includes Kubernetes manifest files for configuration of Honeypot system and Falco IDS in K8s environment. There are also Demo Application written with Node.js which is containing Remote Code Execution Vulnerability (CVE-2023-32314) for demonstrating all addvantages of this architecture to manage Honeypot systems
File Snapshot

[4.0K] /data/pocs/3fbaa0ca0148641d48aab76a0f582a823dc47b42 ├── [ 735] app.js ├── [4.0K] client │   ├── [ 809] package.json │   ├── [1.2M] package-lock.json │   ├── [4.0K] public │   │   ├── [3.8K] favicon.ico │   │   ├── [1.7K] index.html │   │   ├── [5.2K] logo192.png │   │   ├── [9.4K] logo512.png │   │   ├── [ 492] manifest.json │   │   └── [ 67] robots.txt │   ├── [3.3K] README.md │   └── [4.0K] src │   ├── [ 0] App.css │   ├── [ 150] App.js │   ├── [4.0K] Button │   │   ├── [ 153] Button.js │   │   ├── [ 36] index.js │   │   ├── [ 0] lalataplya.js │   │   └── [ 0] style.css │   ├── [ 0] index.css │   └── [ 256] index.js ├── [ 164] cloudDriveVol.yaml ├── [4.0K] config │   └── [ 160] default.json ├── [ 608] deploy.yaml ├── [ 119] Dockerfile ├── [ 545] falcoDaemonset.yaml ├── [ 374] falco-rules.yaml ├── [ 148] falcoWebhook.yaml ├── [ 270] ingressController.yaml ├── [4.0K] models │   └── [ 218] User.js ├── [ 560] mongoDecoyDeploy.yaml ├── [ 524] mongoDeploy.yaml ├── [ 621] networkPolicy.yaml ├── [ 550] package.json ├── [146K] package-lock.json ├── [4.0K] routes │   ├── [2.8K] auth.route.js │   └── [ 801] code.route.js ├── [ 868] sandboxDecoyDeploy.yaml ├── [ 814] sandboxDeploy.yaml ├── [ 348] secureBashWrapper.sh └── [1.6K] trafficChanger.py 7 directories, 38 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.