CVE-2023-0297
CRITICAL EXPLOITED NUCLEIpyLoad js2py Python Execution
Title source: metasploitDescription
Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
Exploits (9)
exploitdb
WORKING POC
VERIFIED
by Gabriel Lima · pythonwebappspython
https://www.exploit-db.com/exploits/51532
nomisec
WORKING POC
28 stars
by bAuh0lz · remote
https://github.com/bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad
nomisec
WORKING POC
1 stars
by overgrowncarrot1 · remote
https://github.com/overgrowncarrot1/CVE-2023-0297
metasploit
WORKING POC
EXCELLENT
by Spencer McIntyre, bAu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/pyload_js2py_exec.rb
Nuclei Templates (1)
PyLoad 0.5.0 - Pre-auth Remote Code Execution (RCE)
CRITICALVERIFIEDby MrHarshvardhan,DhiyaneshDk
Shodan:
html:"pyload" || http.title:"login - pyload" || http.html:"pyload" || http.title:"pyload"
FOFA:
title="login - pyload" || body="pyload" || title="pyload"
References (4)
Scores
CVSS v3
9.8
EPSS
0.9402
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-01-22
CWE
CWE-94
Status
published
Products (2)
pyload/pyload
< 0.4.20
pypi/pyload-ng
0 - 0.5.0b3.dev31PyPI
Published
Jan 14, 2023
Tracked Since
Feb 18, 2026