Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22911 PoC — Rocket.Chat 安全漏洞

Source
Associated Vulnerability
Title:Rocket.Chat 安全漏洞 (CVE-2021-22911)
Description:A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
Readme
# Rocket-Chat-3.12.1-PoC-CVE-2021-22911-

1. Go login page
   
![obraz](https://github.com/user-attachments/assets/d6e7929e-5f12-4412-bb5b-60b81a665298)

2. Register new account, set password as P@$$w0rd!1234
   
![obraz](https://github.com/user-attachments/assets/bc305527-228e-4d70-80a4-94840afa9712)

3. Run script
   
-u = Low priv user email [ No 2fa ]

-a = Administrator email

-t = URL (Eg: http://rocketchat.local)

python3 rocketchat.py -u zxc@zxc.zxc -a admin@chatty.offsec -t http://192.168.169.164:3000

4. Execute any code with RCE. (no result of execution shown)

   ![obraz](https://github.com/user-attachments/assets/11de1e93-f879-4a8b-8deb-7c1df031e3ba)




revshell.com -> interactive shell

![obraz](https://github.com/user-attachments/assets/e3daaf00-a5a0-43c0-9572-59df29a58983)


source:50108.py
File Snapshot

[4.0K] /data/pocs/0b248a895609bfbd878fa610873a5729307f577e ├── [ 819] README.md └── [7.6K] rocketchat.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →