PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal # Exploiting CData within Jetty servers - CVE-2024-31848/49/50/51 - File Path Traversal & File Read
## What it is
A prototype PoC for the automation of vulnerability analysis on targets running CData applications on an embedded Jetty server.
## Usage
Just use `-u` or `--url` to specify your target, the script will attempt to retrieve the `getSettings.rsb?` file, present within all CData instances.
## Example

## Notes
More error handling to be added in future
## Disclaimer
Please use responsibly, exploitability is extremely high with this vulnerability. Only test within your own authorised limitations.
[4.0K] /data/pocs/50013e6c1cf227616e21b683abf11eeb8b35f9be
├── [3.0K] CVE-2024-31848.py
└── [ 728] README.md
0 directories, 2 files