Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-23738 PoC — Postman 安全漏洞

Source
Associated Vulnerability
Title:Postman 安全漏洞 (CVE-2024-23738)
Description:Postman是美国Postman公司的一个为开发者提供的 API 平台。 Postman 10.22 版本之前存在安全漏洞,该漏洞源于通过 RunAsNode 和 enableNodeClilnspectArguments 设置可以执行任意代码。
Description
CVE-2024-23738
Readme
# CVE-2024-23738
 An issue in Postman through 10.22 on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.

 There is a tool designed to automate the process of searching for vulnerabilities in electron: https://github.com/r3ggi/electroniz3r
 <img width="1277" alt="image" src="https://github.com/V3x0r/CVE-2024-23738/assets/83291215/19665649-67b9-4e48-90ea-af64a9fe7ed3">
 

 
 With this tool, we can check if the App is Vulnerable:
 
 <img width="710" alt="image" src="https://github.com/V3x0r/CVE-2024-23738/assets/83291215/d2465158-af23-478b-b975-25c1f2bc90ed">
 
 
 After validation, we can inject our code, and get a shell
 
 
 <img width="843" alt="image" src="https://github.com/V3x0r/CVE-2024-23738/assets/83291215/cd658b45-7fdd-4e12-bf75-61a8efb2ff85">


 Enjoy Your Shell :)


File Snapshot

[4.0K] /data/pocs/de6ac4c04d6e59341db20a4c4e1af4cd9ed5b902 └── [ 855] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.