exploitdb
WORKING POC
by Beatriz Fresno Naumova · textwebappspython
https://www.exploit-db.com/exploits/52474
This is a functional proof-of-concept exploit for CVE-2024-23334, demonstrating a directory traversal vulnerability in aiohttp when configured to serve static files with follow_symlinks=True. The script is designed for local testing and includes safety checks to prevent misuse.
Classification
Working Poc 95%
Target:
aiohttp 3.9.1
No auth needed
Prerequisites:
aiohttp 3.9.1 configured to serve static files with follow_symlinks=True · local access to the vulnerable service
nomisec
WORKING POC
27 stars
by jhonnybonny · infoleak
https://github.com/jhonnybonny/CVE-2024-23334
This repository contains a functional PoC for CVE-2024-23334, demonstrating an LFI vulnerability in aiohttp via path traversal attacks. It includes an exploit script, a Nuclei template for detection, and a test server to validate the vulnerability.
Classification
Working Poc 95%
Target:
aiohttp (version not specified)
No auth needed
Prerequisites:
Target server running aiohttp with vulnerable static file handling
nomisec
WORKING POC
20 stars
by z3rObyte · poc
https://github.com/z3rObyte/CVE-2024-23334-PoC
This repository contains a functional proof-of-concept for CVE-2024-23334, a path traversal vulnerability in AioHTTP <= 3.9.1. The exploit script iteratively tests path traversal sequences to access sensitive files (e.g., /etc/passwd) via a vulnerable static file route.
Classification
Working Poc 95%
Target:
AioHTTP <= 3.9.1
No auth needed
Prerequisites:
AioHTTP server with static file route configured · Network access to the target server
nomisec
SUSPICIOUS
5 stars
by ox1111 · infoleak
https://github.com/ox1111/CVE-2024-23334
The repository lacks actual exploit code and instead provides a basic aiohttp server setup with no clear demonstration of CVE-2024-23334. The README is vague and directs users to an external YouTube video for details, which is a common tactic in suspicious repos.
Classification
Suspicious 90%
Target:
aiohttp (version 3.9.1)
No auth needed
Prerequisites:
aiohttp 3.9.1 installed
nomisec
WORKING POC
4 stars
by wizarddos · infoleak
https://github.com/wizarddos/CVE-2024-23334
This repository contains a functional Python exploit for CVE-2024-23334, an LFI/path traversal vulnerability in aiohttp <= 3.9.1. The exploit leverages the `follow_symlinks=True` misconfiguration to traverse directories and read arbitrary files.
Classification
Working Poc 95%
Target:
aiohttp <= 3.9.1
No auth needed
Prerequisites:
Target server running aiohttp with `follow_symlinks=True` · Accessible static directory
nomisec
WORKING POC
4 stars
by s4botai · infoleak
https://github.com/s4botai/CVE-2024-23334-PoC
The repository contains a functional bash script that exploits a Local File Inclusion (LFI) vulnerability in aiohttp 3.9.1 by leveraging the 'follow_symlinks' option to bypass directory traversal restrictions. The script automates the process of sending payloads with increasing '../' sequences to access arbitrary files on the target system.
Classification
Working Poc 95%
Target:
aiohttp 3.9.1
No auth needed
Prerequisites:
Target URL with vulnerable aiohttp instance · Knowledge of file path to read
nomisec
WORKING POC
4 stars
by sxyrxyy · poc
https://github.com/sxyrxyy/aiohttp-exploit-CVE-2024-23334-certstream
This repository contains a functional exploit for CVE-2024-23334, targeting a path traversal vulnerability in aiohttp's static file handling. The exploit collects domains from certstream, checks for vulnerable servers, and attempts to read /etc/passwd via crafted requests.
Classification
Working Poc 95%
Target:
aiohttp (specific version not specified)
No auth needed
Prerequisites:
Access to certstream.calidog.io · Vulnerable aiohttp server with exposed static route
nomisec
WORKING POC
2 stars
by TheRedP4nther · infoleak
https://github.com/TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC
This repository contains a functional Bash script that automates Local File Inclusion (LFI) attacks on vulnerable aiohttp servers by exploiting CVE-2024-23334. The script uses directory traversal techniques to access arbitrary files on the system.
Classification
Working Poc 95%
Target:
aiohttp versions prior to 3.9.2
No auth needed
Prerequisites:
aiohttp server with misconfigured static routes · curl installed on the attacker's system
nomisec
WORKING POC
1 stars
by Betan423 · infoleak
https://github.com/Betan423/CVE-2024-23334-PoC
This repository contains a functional proof-of-concept for CVE-2024-23334, demonstrating a Local File Inclusion (LFI) vulnerability in aiohttp due to improper handling of symlinks in static file serving. The exploit uses path traversal techniques to access sensitive files like /etc/passwd.
Classification
Working Poc 95%
Target:
aiohttp (version not specified)
No auth needed
Prerequisites:
aiohttp server with static file serving enabled · symlinks allowed in static directory
nomisec
WORKING POC
1 stars
by 0xR00 · poc
https://github.com/0xR00/CVE-2024-23334
The repository contains a functional exploit script for CVE-2024-23334, which appears to be a directory traversal vulnerability. The exploit uses a bash script to craft a malicious path and retrieve arbitrary files from the target server via a vulnerable endpoint.
Classification
Working Poc 90%
Target:
aiohttp (specific version not specified)
No auth needed
Prerequisites:
Target server running vulnerable aiohttp configuration · Network access to the target server
nomisec
WORKING POC
1 stars
by 0xR0t · poc
https://github.com/0xR0t/CVE-2024-23334
The repository contains a functional exploit script for CVE-2024-23334, which appears to be a directory traversal vulnerability. The script uses a series of '../' sequences to access files outside the intended directory, suggesting an improper path sanitization issue in the target software.
Classification
Working Poc 90%
Target:
aiohttp (version not specified)
No auth needed
Prerequisites:
Target server running vulnerable aiohttp configuration · Network access to the target server
nomisec
WORKING POC
1 stars
by Pylonet · remote
https://github.com/Pylonet/CVE-2024-23334
The repository contains a functional exploit script for CVE-2024-23334, which appears to be a directory traversal vulnerability. The script uses a path traversal technique to access arbitrary files on the target system by manipulating the URL path.
Classification
Working Poc 90%
Target:
Pylonet (specific version not specified)
No auth needed
Prerequisites:
Target system running vulnerable Pylonet software · Network access to the target system
nomisec
WORKING POC
1 stars
by Arc4he · infoleak
https://github.com/Arc4he/CVE-2024-23334-PoC
This repository contains a functional Python-based PoC for CVE-2024-23334, a path traversal vulnerability. The exploit uses `curl` to send crafted HTTP requests with `../` sequences to access files outside the intended directory, targeting a local server on port 8081.
Classification
Working Poc 90%
Target:
Unknown (local server on port 8081)
No auth needed
Prerequisites:
Python 3.x · curl · requests library · colorama library · target server running on localhost:8081
gitlab
WORKING POC
by Eggzy · poc
https://gitlab.com/Eggzy/cve-2024-23334-poc-exploit
This repository contains a functional bash script that exploits a path traversal vulnerability in the aiohttp Python library (CVE-2024-23334). The script iteratively appends '../' sequences to a base URL to access sensitive files, such as SSH keys or system files, and retrieves their contents if a 200 OK response is received.
Classification
Working Poc 95%
Target:
aiohttp (Python web server library)
No auth needed
Prerequisites:
bash environment · curl installed · vulnerable aiohttp server
nomisec
WORKING POC
by Sn0wBaall · poc
https://github.com/Sn0wBaall/CVE-2024-23334-PoC
This repository contains a functional Python script that exploits CVE-2024-23334, a path traversal vulnerability in aiohttp versions ≥ 1.0.5 and < 3.9.2. The script sends a crafted HTTP request to retrieve arbitrary files from the server by manipulating the path parameter.
Classification
Working Poc 95%
Target:
aiohttp versions ≥ 1.0.5 and < 3.9.2
No auth needed
Prerequisites:
Target server running vulnerable aiohttp version with static file serving enabled and follow_symlinks=True
nomisec
WORKING POC
by BestDevOfc · infoleak
https://github.com/BestDevOfc/CVE-2024-23334-PoC
This repository contains a functional Python script that exploits a path traversal vulnerability in the AioHTTP library (versions <= 3.9.1). The script iteratively appends '../' sequences to a known public directory (e.g., '/static/') to access arbitrary files, such as '/etc/passwd'.
Classification
Working Poc 95%
Target:
AioHTTP <= 3.9.1
No auth needed
Prerequisites:
A public-facing directory (e.g., '/static/' or '/assets/') on the target server
nomisec
WORKING POC
by binaryninja · infoleak
https://github.com/binaryninja/CVE-2024-23334
This repository contains a functional exploit PoC for CVE-2024-23334, demonstrating a directory traversal vulnerability in a web application. The exploit script attempts to access sensitive files on the server using path manipulation techniques, while the server.py file sets up a vulnerable web server using aiohttp.
Classification
Working Poc 95%
Target:
Web application using aiohttp (version not specified)
No auth needed
Prerequisites:
Docker · Python 3.10+ · aiohttp library
nomisec
WORKING POC
by brian-edgar-re · poc
https://github.com/brian-edgar-re/poc-cve-2024-23334
This repository contains a functional proof-of-concept exploit for CVE-2024-23334, demonstrating path traversal and local file inclusion (LFI) in the aiohttp library. It includes a Dockerized environment, exploit scripts, and detailed steps to reproduce the vulnerability via symlink manipulation and ZIP file uploads.
Classification
Working Poc 95%
Target:
aiohttp (version not specified)
No auth needed
Prerequisites:
Docker · Python3 · ability to upload files to the target server