Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-21534 PoC — JSONPath Plus 安全漏洞

Source
Associated Vulnerability
Title:JSONPath Plus 安全漏洞 (CVE-2024-21534)
Description:JSONPath Plus是JSONPath Plus开源的一个库。 JSONPath Plus 10.0.0之前版本存在安全漏洞,该漏洞源于输入清理不当,容易受到远程代码执行(RCE)攻击,攻击者可以利用该漏洞在系统上执行任意代码。
Description
Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability
Readme
# CVE-2024-21534: Remote Code Execution Vulnerability in `jsonpath-plus` (<=10.0.7)

## Summary

This repository contains a Proof of Concept (PoC) exploit for a critical Remote Code Execution (RCE) vulnerability in the `jsonpath-plus` package, affecting versions prior to 10.0.7. The issue stems from improper input sanitization, allowing attackers to execute arbitrary code by leveraging unsafe defaults in Node’s VM module. The vulnerability was published 2024-10-11 and has a **CVSS Score** of 9.8 (Critical).

**Note:** Although an attempt to mitigate this vulnerability was made in [version 10.0.0](https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3), the flaw remains exploitable under certain payload variations as discussed in [issue #226](https://github.com/JSONPath-Plus/JSONPath/issues/226).

---

### Description

The vulnerability enables remote attackers to execute arbitrary code on affected systems due to the unsafe usage of the VM in Node.js. This vulnerability was initially addressed in version 10.0.0, but further investigation revealed it could still be exploited with specific payloads.

---

## Exploit Setup and Reproduction

### Prerequisites

To reproduce the exploit, ensure you have the following tools installed:
- Docker

Use the provided assets to build your own image or use the image I published in Dockerhub:

### Steps to Reproduce

1. Clone this repository:
  
   ```bash
   git clone https://github.com/your-username/CVE-2024-XXXX-PoC.git
   cd CVE-2024-XXXX-PoC
   TODO
   ```


---

A special thanks to Andrea Angelo Raineri for his contribution to the identification and reporting of this vulnerability,
and for his kind assistance to find the right query to exploit the vulnerability.
File Snapshot

[4.0K] /data/pocs/707b356c0cd90c40387e03ad1b172f273925f5ea ├── [4.0K] curling-app │   ├── [ 318] Dockerfile │   └── [2.4K] execute_curls.sh ├── [ 776] deployment.yml ├── [4.0K] jsonizer-app │   ├── [ 85] docker-compose.yml │   ├── [ 814] Dockerfile │   ├── [2.5K] index.js │   └── [ 342] package.json ├── [1.0K] LICENSE └── [1.7K] README.md 2 directories, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.