Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-21534 PoC — JSONPath Plus 安全漏洞

Source
Associated Vulnerability
Title:JSONPath Plus 安全漏洞 (CVE-2024-21534)
Description:All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
Description
Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability
Readme
# CVE-2024-21534: Remote Code Execution Vulnerability in `jsonpath-plus` (<=10.0.7)

## Summary

This repository contains a Proof of Concept (PoC) exploit for a critical Remote Code Execution (RCE) vulnerability in the `jsonpath-plus` package, affecting versions prior to 10.0.7. The issue stems from improper input sanitization, allowing attackers to execute arbitrary code by leveraging unsafe defaults in Node’s VM module. The vulnerability was published 2024-10-11 and has a **CVSS Score** of 9.8 (Critical).

**Note:** Although an attempt to mitigate this vulnerability was made in [version 10.0.0](https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3), the flaw remains exploitable under certain payload variations as discussed in [issue #226](https://github.com/JSONPath-Plus/JSONPath/issues/226).

---

### Description

The vulnerability enables remote attackers to execute arbitrary code on affected systems due to the unsafe usage of the VM in Node.js. This vulnerability was initially addressed in version 10.0.0, but further investigation revealed it could still be exploited with specific payloads.

---

## Exploit Setup and Reproduction

### Prerequisites

To reproduce the exploit, ensure you have the following tools installed:
- Docker

Use the provided assets to build your own image or use the image I published in Dockerhub:

### Steps to Reproduce

1. Clone this repository:
  
   ```bash
   git clone https://github.com/your-username/CVE-2024-XXXX-PoC.git
   cd CVE-2024-XXXX-PoC
   TODO
   ```


---

A special thanks to Andrea Angelo Raineri for his contribution to the identification and reporting of this vulnerability,
and for his kind assistance to find the right query to exploit the vulnerability.
File Snapshot

[4.0K] /data/pocs/707b356c0cd90c40387e03ad1b172f273925f5ea ├── [4.0K] curling-app │   ├── [ 318] Dockerfile │   └── [2.4K] execute_curls.sh ├── [ 776] deployment.yml ├── [4.0K] jsonizer-app │   ├── [ 85] docker-compose.yml │   ├── [ 814] Dockerfile │   ├── [2.5K] index.js │   └── [ 342] package.json ├── [1.0K] LICENSE └── [1.7K] README.md 2 directories, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →