A walkthrough of exploiting a Linux machine running a JavaScript sandbox application. The attack chain involves exploiting CVE-2024-28397 in js2py to escape the sandbox and achieve remote code execution, cracking MD5 password hashes from a SQLite database to pivot to another user, and finally abusing sudo privileges on

27m read timeFrom 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconShell as appShell as marcoShell as root

Sort: