Skip to content

POC for CVE-2024-36527: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal

Notifications You must be signed in to change notification settings

bigb0x/CVE-2024-36527

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-36527 PoC and Bulk Scanner

Banner

Overview

POC for CVE-2024-36527: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.

Based on the security advisory published by Zac Wang , POC was created by M Ali.

How to Use

Single Target Scan

To scan a single target endpoint:

python cve-2024-36527.py -u target

Bulk Target Scan

To mass scan bulk targets:

python cve-2024-36527.py -f targets.txt

Installation

Minimum Requirements

  • Python 3.6 or higher
  • requests library

Installing The Script

git clone https://github.com/bigb0x/cve-2024-36527.git; cd cve-2024-36527

Installing Required Packages

Install the required packages using pip:

pip install requests

Disclaimer

I'm not a professional developer; I code as a hobby. I like to create my own tools for fun and educational purposes only. I 'm releasing this tool is for educational use only. I do not support or encourage hacking or unauthorized access to any system or network. Please use this tool responsibly and only on systems where you have clear permission to test. You are responsible for any misuse.

References

About

POC for CVE-2024-36527: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages