CVE-2024-28397

MEDIUM NUCLEI

pyload-ng js2py - Remote Code Execution

Title source: nuclei

Description

An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.

Exploits (17)

nomisec WORKING POC 71 stars
by Marven11 · poc
https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape
nomisec WORKING POC 13 stars
by naclapor · poc
https://github.com/naclapor/CVE-2024-28397
nomisec WORKING POC 5 stars
by GhostOverflow · poc
https://github.com/GhostOverflow/CVE-2024-28397-command-execution-poc
nomisec WORKING POC 2 stars
by xeloxa · poc
https://github.com/xeloxa/CVE-2024-28397-Js2Py-RCE-Exploit
nomisec WORKING POC 1 stars
by releaseown · poc
https://github.com/releaseown/exploit-js2py
nomisec WORKING POC 1 stars
by L1337Xi · poc
https://github.com/L1337Xi/CVE-2024-28397-Exploit-Automation
nomisec WORKING POC 1 stars
by s0m1s0ng · poc
https://github.com/s0m1s0ng/CVE-2024-28397-Reverse-Shell
nomisec WORKING POC 1 stars
by 0xPadme · poc
https://github.com/0xPadme/CVE-2024-28397-Reverse-Shell
nomisec WORKING POC 1 stars
by harutomo-jp · poc
https://github.com/harutomo-jp/CVE-2024-28397-RCE
nomisec WORKING POC
by 3z-p0wn · poc
https://github.com/3z-p0wn/CVE-2024-28397-exploit
nomisec WORKING POC
by D3ltaFormation · poc
https://github.com/D3ltaFormation/CVE-2024-28397-Js2Py-RCE
nomisec WORKING POC
by vitaciminIPI · poc
https://github.com/vitaciminIPI/CVE-2024-28397-RCE
nomisec WORKING POC
by 0xDTC · poc
https://github.com/0xDTC/js2py-Sandbox-Escape-CVE-2024-28397-RCE
nomisec WORKING POC
by ExtremeUday · poc
https://github.com/ExtremeUday/Remote-Code-Execution-CVE-2024-28397-pyload-ng-js2py-
nomisec WORKING POC
by Naved124 · poc
https://github.com/Naved124/CVE-2024-28397-js2py-Sandbox-Escape
nomisec WORKING POC
by CYBER-WARRIOR-SEC · poc
https://github.com/CYBER-WARRIOR-SEC/CVE-2024-28397-js2py-Sandbox-Escape
metasploit WORKING POC EXCELLENT
by Marven11, Spencer McIntyre, jheysel-r7 · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/pyload_js2py_cve_2024_39205.rb

Nuclei Templates (1)

pyload-ng js2py - Remote Code Execution
MEDIUMVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.html:"pyload"
FOFA: body="pyload"

Scores

CVSS v3 5.3
EPSS 0.6510
EPSS Percentile 98.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Details

CWE
CWE-94
Status published
Products (1)
pypi/js2py 0PyPI
Published Jun 20, 2024
Tracked Since Feb 18, 2026