POC详情: 707b356c0cd90c40387e03ad1b172f273925f5ea

来源
关联漏洞
标题: JSONPath Plus 安全漏洞 (CVE-2024-21534)
描述:JSONPath Plus是JSONPath Plus开源的一个库。 JSONPath Plus 10.0.0之前版本存在安全漏洞,该漏洞源于输入清理不当,容易受到远程代码执行(RCE)攻击,攻击者可以利用该漏洞在系统上执行任意代码。
描述
Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability
介绍
# CVE-2024-21534: Remote Code Execution Vulnerability in `jsonpath-plus` (<=10.0.7)

## Summary

This repository contains a Proof of Concept (PoC) exploit for a critical Remote Code Execution (RCE) vulnerability in the `jsonpath-plus` package, affecting versions prior to 10.0.7. The issue stems from improper input sanitization, allowing attackers to execute arbitrary code by leveraging unsafe defaults in Node’s VM module. The vulnerability was published 2024-10-11 and has a **CVSS Score** of 9.8 (Critical).

**Note:** Although an attempt to mitigate this vulnerability was made in [version 10.0.0](https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3), the flaw remains exploitable under certain payload variations as discussed in [issue #226](https://github.com/JSONPath-Plus/JSONPath/issues/226).

---

### Description

The vulnerability enables remote attackers to execute arbitrary code on affected systems due to the unsafe usage of the VM in Node.js. This vulnerability was initially addressed in version 10.0.0, but further investigation revealed it could still be exploited with specific payloads.

---

## Exploit Setup and Reproduction

### Prerequisites

To reproduce the exploit, ensure you have the following tools installed:
- Docker

Use the provided assets to build your own image or use the image I published in Dockerhub:

### Steps to Reproduce

1. Clone this repository:
  
   ```bash
   git clone https://github.com/your-username/CVE-2024-XXXX-PoC.git
   cd CVE-2024-XXXX-PoC
   TODO
   ```


---

A special thanks to Andrea Angelo Raineri for his contribution to the identification and reporting of this vulnerability,
and for his kind assistance to find the right query to exploit the vulnerability.
文件快照

[4.0K] /data/pocs/707b356c0cd90c40387e03ad1b172f273925f5ea ├── [4.0K] curling-app │   ├── [ 318] Dockerfile │   └── [2.4K] execute_curls.sh ├── [ 776] deployment.yml ├── [4.0K] jsonizer-app │   ├── [ 85] docker-compose.yml │   ├── [ 814] Dockerfile │   ├── [2.5K] index.js │   └── [ 342] package.json ├── [1.0K] LICENSE └── [1.7K] README.md 2 directories, 9 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。