CVE-2018-8021 Proof-Of-Concept and Exploit
Switch branches/tags
Nothing to show
Clone or download
Latest commit 1dd8814 Dec 3, 2018
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.gitignore Initial commit Dec 2, 2018
LICENSE Initial commit Dec 2, 2018
README.md Update README.md Dec 3, 2018
exploit.py Update exploit.py Dec 3, 2018

README.md

Apache Superset pickle library code execution

IBM : Apache Superset could allow a remote attacker to execute arbitrary code on the system, caused by the use of unsafe load method from the pickle library to deserialize data. By sending specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

Refs :

Usage :

usage: exploit.py [-h] -t TCP -tp TPORT -i IP -p PORT -U USER -P PASSW

optional arguments:
  -h, --help            show this help message and exit
  -t TCP, --tcp TCP     tcp ip for shell
  -tp TPORT, --tport TPORT
                        tcp port for shell
  -i IP, --ip IP        ip
  -p PORT, --port PORT  port
  -U USER, --user USER  User belong to Superset 
  -P PASSW, --passw PASSW
                        password of the user !

Note : User and Pass Must belong to a user that can import Dashboards on Superset!!!

Creadits

Please Note Original PoC has been written by David May [david.may@semanticbits.com][https://github.com/DavidMay121]