Skip to content

br0xpl/gotenberg_hack

main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
e
 
 
 
 
 
 
 
 

PoC code for exploiting Gotenberg 2020 vulnerabilities

Refer to CVE-2020-13449, CVE-2020-13450, CVE-2020-13451, CVE-2020-13452: https://sploit.tech/2020/12/29/Gotenberg.html

Write-up:

Instructions

  1. Run gotenberg version 6.2.0 or earlier:
$ docker run --rm -p 3000:3000 --name gotenberg thecodingmachine/gotenberg:6.2.0
  1. Execute the exploit with proper url:
$ ./go.sh http://localhsot:3000
  1. Grab a coffee and wait.

  2. When script prints "Executed!" message you can check the /tmp/hacked file, check if it's there:

$ docker exec gotenberg bash -c "cat /tmp/hacked"

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published