Implementation of CVE-2022-26134# CVE-2022-26134
Implementation of CVE-2022-26134
This repository contains my implementation of the exploit for CVE-2022-26134. The version implemented here
bypasses the `isSafeExpression` checks in versions such as 7.18.0.
The exploit can be run in two modes:
The first mode allows you to run one command at a time:
```bash
python3 cve-2022-26134.py <host> <command>
```
This would return the output of the command if it succeeds or display an empty line if not
The second mode to run this command is interactive mode:
```bash
python3 cve-2022-26134.py <host> -i
```
This launches a non persistent interactive shell, where you can type commands, which get executed on the
server and then display the results. No state is held between commands.

[4.0K] /data/pocs/f88637190677d5320e1681e43ca2d375137e1f3c
├── [4.0K] assets
│ └── [2.8M] cve-2022-26134.gif
├── [3.4K] cve-2022-26134.py
├── [1.0K] LICENSE
└── [ 789] README.md
1 directory, 4 files