Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-32651 PoC — Server Side Template Injection in Jinja2 allows Remote Command Execution

Source
Associated Vulnerability
Title:Server Side Template Injection in Jinja2 allows Remote Command Execution (CVE-2024-32651)
Description:changedetection.io is an open source web page change detection, website watcher, restock monitor and notification service. There is a Server Side Template Injection (SSTI) in Jinja2 that allows Remote Command Execution on the server host. Attackers can run any system command without any restriction and they could use a reverse shell. The impact is critical as the attacker can completely takeover the server machine. This can be reduced if changedetection is behind a login page, but this isn't required by the application (not by default and not enforced).
Description
changedetection rce though ssti
Readme
# cve-2024-32651
changedetection rce though ssti
File Snapshot

[4.0K] /data/pocs/2dea4a59458659e346fcf5386cff35eed4c5c8c9 ├── [4.7K] cve-2024-32651.py └── [ 49] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →