Skip to content

madedis/CVE-2024-48990-Exploit

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2024-48990 Exploit

My full writeup for how I came to re-discovering this N-day and creating my own exploit for it can be found on my blog.

Essentially, you can git clone this repository into an attacker-controlled directory, export PYTHONPATH=<attacker_directory>, and then run main.py with that PYTHONPATH value set. Then, set up a netcat listener on 127.0.0.1:1337 and wait for a cron job or system administrator to run a sudo apt install on the system to see a root shell in your listener.

About

My exploit for CVE-2024-48990. Full details of how I made this are on my blog.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 100.0%