Skip to content

Latest commit

 

History

History
22 lines (11 loc) · 728 Bytes

README.md

File metadata and controls

22 lines (11 loc) · 728 Bytes

Exploiting CData within Jetty servers - CVE-2024-31848/49/50/51 - File Path Traversal & File Read

What it is

A prototype PoC for the automation of vulnerability analysis on targets running CData applications on an embedded Jetty server.

Usage

Just use -u or --url to specify your target, the script will attempt to retrieve the getSettings.rsb? file, present within all CData instances.

Example

image

Notes

More error handling to be added in future

Disclaimer

Please use responsibly, exploitability is extremely high with this vulnerability. Only test within your own authorised limitations.