🌐
GitHub
github.com › wdahlenburg › werkzeug-debug-console-bypass
GitHub - wdahlenburg/werkzeug-debug-console-bypass: Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector. · GitHub
Werkzeug has a debug console that requires a pin by default. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector.
Starred by 64 users
Forked by 7 users
Languages   Python 85.8% | Dockerfile 14.2%
🌐
GitHub
github.com › grav3m1nd-byte › werkzeug-pin
GitHub - grav3m1nd-byte/werkzeug-pin: Yet another Werkzeug Console Pin Exploit Explanation · GitHub
As explained by Carlos Polop in Hacktricks.xyz, this exploit is to access /console from Werkzeug when it requires a pin.
Author   grav3m1nd-byte
🌐
HackTricks
book.hacktricks.xyz › home › network services pentesting › pentesting web › werkzeug
Werkzeug / Flask Debug - HackTricks
A message regarding the “console locked” scenario is encountered when attempting to access Werkzeug’s debug interface, indicating a requirement for a PIN to unlock the console. The suggestion is made to exploit the console PIN by analyzing the PIN generation algorithm in Werkzeug’s debug initialization file (__init__.py).
🌐
Werkzeug
werkzeug.palletsprojects.com › en › stable › debug
Debugging Applications — Werkzeug Documentation (3.1.x)
This is a security helper to make ... to be exploited if you forget to disable it when deploying to production. The PIN based authentication is enabled by default. The first time a console is opened, a dialog will prompt for a PIN that is printed to the command line.
🌐
YouTube
youtube.com › watch
Agile HTB Walkthrough - Werkzeug Console PIN Exploit - YouTube
Agile is a Hack The Box machine hosting a password manager solution. A file read vulnerability in the application, combined with Flask running in debug mode,...
Published   February 7, 2025
🌐
Daehee
daehee.com › blog › werkzeug-console-pin-exploit
Werkzeug Console PIN Exploit | Daehee Park
January 10, 2020 - You can find the PIN printed out on the standard output of your shell that runs the server · Locate vulernable Werkzeug debug console at path vulnerable-site.com/console, but is locked by secret PIN number.
🌐
YouTube
youtube.com › watch
Werkzeug PIN exploit - TryHackMe's OWASP Top 10 2021
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
🌐
HackTricks
hacktricks.boitatech.com.br › pentesting › pentesting-web › werkzeug
werkzeug | HackTricks - Boitatech
September 30, 2021 - Locate vulnerable Werkzeug debug console at path vulnerable-site.com/console, but is locked by secret PIN number.
🌐
GitHub
github.com › grav3m1nd-byte › werkzeug-pin › blob › main › README.md
werkzeug-pin/README.md at main · grav3m1nd-byte/werkzeug-pin
As explained by Carlos Polop in Hacktricks.xyz, this exploit is to access /console from Werkzeug when it requires a pin.
Author   grav3m1nd-byte
Find elsewhere
🌐
Gitbook
angelica.gitbook.io › hacktricks › network-services-pentesting › pentesting-web › werkzeug
Werkzeug / Flask Debug - HackTricks - GitBook
November 10, 2024 - GitHub - Ruulian/wconsole_extractor: WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a python function that leaks a file content and you have your shell :)GitHub · https://www.daehee.com/werkzeug-console-pin-exploit/
🌐
Greg Scharf
blog.gregscharf.com › 2023 › 04 › 09 › lfi-to-rce-in-flask-werkzeug-application
LFI to RCE in Flask Werkzeug Application :: Greg Scharf — Development & Security
April 10, 2023 - Second, check if the secret key used to sign session cookies is visible anywhere in the source code. Finally, check whether debugging has been enabled in Werkzeug when the application was started. If debugging is enabled, attempt to crack the PIN to access the debugging console and execute code, which is what I will cover here.
🌐
Gitbook
grav3m1nd-byte.gitbook.io › htb-resources › useful-scripts-and-others › werkzeug-pin-exploit
Werkzeug Console Pin Exploit | Walkthroughs and other Guides
These exploits were developed after reviewing Werkzeug source code repo to better understand how the code is generated to then reverse it. The following is the function that generates the pin in Werkzeug from __init__.py.
🌐
Rapid7
rapid7.com › db › modules › exploit › multi › http › werkzeug_debug_rce
Pallete Projects Werkzeug Debugger Remote Code ...
This module will exploit the Werkzeug debug console to put down a Python shell. Werkzeug is included with Flask, but not enabled by default. It is also included in other projects, for example the RunServerPlus extension for Django.
🌐
Bengrewell
bengrewell.com › cracking-flask-werkzeug-console-pin
Cracking Werkzeug Debugger Console Pin
March 11, 2023 - Learn how to crack the Werkzeug Debugger pin and gain access to the console in Python-based Flask web applications with this educational blog post.
🌐
NIST
nvd.nist.gov › vuln › detail › cve-2024-34069
CVE-2024-34069 Detail - NVD
This is a potential security issue, you are being redirected to https://nvd.nist.gov · Official websites use .gov A .gov website belongs to an official government organization in the United States
🌐
YouTube
youtube.com › 0xdf
Reassembling Werkzeug's Pin - Hacking Flask Debug Mode [Part 1] - YouTube
Flask is a really common Python web framework, and one of the features it offers is a debug mode. In this mode, when your application crashes, it gives not o...
Published   July 31, 2023
Views   3K
🌐
GitHub
github.com › vignesh21-git › werkzeug_debug_bypass_POC
GitHub - vignesh21-git/werkzeug_debug_bypass_POC: Werkzeug Console PIN Exploit · GitHub
By exploiting the path traversal vulnerability and gathering system information, we successfully generate the debug pin required to access the Werkzeug debugger console remotely.
Author   vignesh21-git
🌐
CTFtime.org
ctftime.org › writeup › 17955
CTFtime.org / TetCTF 2020 / The Prophet / Writeup
Second item in the resulting tuple is the cookie name for remembering. """ pin = os.environ.get("WERKZEUG_DEBUG_PIN") rv = None num = None
🌐
GitHub
github.com › its-arun › Werkzeug-Debug-RCE
GitHub - its-arun/Werkzeug-Debug-RCE: Python script for exploiting Werkzeug Debug RCE useful for CTF · GitHub
Python script for exploiting Werkzeug Debug RCE useful for CTFs where you just need to read a particular file or execute some command.
Starred by 39 users
Forked by 22 users
Languages   Python
🌐
Vulnlab
arz101.medium.com › hackthebox-opensource-84e644164a4c
HackTheBox — Opensource - ARZ101 - Medium
October 8, 2022 - We can get foothold by generating the console PIN using the exploit from here · https://github.com/wdahlenburg/werkzeug-debug-console-bypass ·