Skip to content

A proof of concept of the LFI vulnerability on aiohttp 3.9.1

Notifications You must be signed in to change notification settings

s4botai/CVE-2024-23334-PoC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

CVE-2024-23334-PoC

A proof of concept of the LFI vulnerability on aiohttp 3.9.1. The option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system.

Usage

bash lfi.sh -u target_url -f File_to_Read

imagen

Example

imagen

About

A proof of concept of the LFI vulnerability on aiohttp 3.9.1

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages