Skip to content

CVE-2021-26084-EXP v1.0.0

Latest
Compare
Choose a tag to compare
@vpxuser vpxuser released this 05 Jul 05:48

Release Description:

CVE-2021-26084 Exploit

This release contains an exploit for CVE-2021-26084, a vulnerability in a popular software application. The exploit targets versions 1.0.0 to 1.5.0, which are known to be vulnerable to a remote code execution attack.

Usage:

  1. Clone the repository:
git clone https://github.com/your-username/CVE-2021-26084-exploit.git
  1. Change into the project directory:
cd CVE-2021-26084-exploit
  1. Build the exploit:
go build
  1. Run the exploit with the following command:
./CVE-2021-26084-exploit -u <target-url> -p <injection-parameter> -c <command-to-execute>

Replace with the URL of the vulnerable application.
Replace with the parameter to be injected.
Replace with the command you want to execute on the target application.

The exploit will send a crafted request to the target application with the injected command. It will then check the response for successful command execution.

Example:

./CVE-2021-26084-exploit -u http://target-application.com -p username -c "cat /etc/passwd"

This example runs the exploit against the target application at http://target-application.com, injecting the command "cat /etc/passwd" into the username parameter.

Disclaimer:
This exploit is for educational and testing purposes only. Use it responsibly and with proper authorization. The author is not responsible for any misuse or damage caused by this exploit.

Contributing:
Contributions are welcome! If you find any issues or want to improve the exploit, feel free to create a pull request.

License:
This project is licensed under the MIT License.