Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/langriklol/cve-2020-15227
CVE-2020-15227 exploit
https://github.com/langriklol/cve-2020-15227
exploit rce security vulnerability
Last synced: 21 days ago
JSON representation
CVE-2020-15227 exploit
- Host: GitHub
- URL: https://github.com/langriklol/cve-2020-15227
- Owner: Langriklol
- Created: 2020-10-09T13:13:14.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2020-11-05T21:29:35.000Z (over 4 years ago)
- Last Synced: 2024-11-18T00:11:30.254Z (3 months ago)
- Topics: exploit, rce, security, vulnerability
- Language: Python
- Homepage:
- Size: 5.86 KB
- Stars: 1
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
CVE-2020-15227
==============DISCLAIMER! I take no responsibility of using it in wild life environment so please do NOT do it. This thingy is just to demonstrate and for test things for sysadmins
I made this exploit according to publishing a CVE of David Grudl (The founder of Nette foundation)
As a security researcher I developed a little monster (for educational and demonstrational purposes of course and for ethical reasons I've made autofixer too)
The security vulnerability exploits callback parameter in nette.micro. We have no idea why the crap that exists (possible backdoor feature?)
Exploit is trying to get reverse shell from the victim server. The URL is hardcoded here so no stress about exploit edits.
PRs are welcomed!