This exploit leverages a memory corruption vulnerability in ZSH 5.9 to achieve remote code execution (RCE) by manipulating memory addresses and injecting a reverse shell payload via GDB. It uses pexpect to automate GDB interactions, demonstrating a functional exploit chain.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Complex
Reliability
Reliable
Target:ZSH 5.9
No auth needed
Prerequisites:GDB with pwndbg · ZSH 5.9 binary · network connectivity to attacker-controlled IP