POC for CVE-2024-36527: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.
Based on the security advisory published by Zac Wang , POC was created by M Ali.
To scan a single target endpoint:
python cve-2024-36527.py -u target
To mass scan bulk targets:
python cve-2024-36527.py -f targets.txt
- Python 3.6 or higher
requests
library
git clone https://github.com/bigb0x/cve-2024-36527.git; cd cve-2024-36527
Install the required packages using pip:
pip install requests
I'm not a professional developer; I code as a hobby. I like to create my own tools for fun and educational purposes only. I 'm releasing this tool is for educational use only. I do not support or encourage hacking or unauthorized access to any system or network. Please use this tool responsibly and only on systems where you have clear permission to test. You are responsible for any misuse.