A walkthrough of exploiting a Linux machine running a JavaScript sandbox application. The attack chain involves exploiting CVE-2024-28397 in js2py to escape the sandbox and achieve remote code execution, cracking MD5 password hashes from a SQLite database to pivot to another user, and finally abusing sudo privileges on
Sort: