### [CVE-2021-43857](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43857) ![](https://img.shields.io/static/v1?label=Product&message=Gerapy&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%200.9.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brightgreen) ### Description Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8. ### POC #### Reference - http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html #### Github - https://github.com/ARPSyndicate/cve-scores - https://github.com/ARPSyndicate/cvemon - https://github.com/AlienTec1908/University_HackMyVM_Easy - https://github.com/ChamalBandara/CVEs - https://github.com/Enes4xd/Enes4xd - https://github.com/EssenceCyber/Exploit-List - https://github.com/G4sp4rCS/CVE-2021-43857-POC - https://github.com/LongWayHomie/CVE-2021-43857 - https://github.com/MelvinM8/OSCP - https://github.com/Mr-Tree-S/POC_EXP - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/ProwlSec/gerapy-cve-2021-43857 - https://github.com/PuddinCat/GithubRepoSpider - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/cr0ss2018/cr0ss2018 - https://github.com/ezelnur6327/Enes4xd - https://github.com/ezelnur6327/ezelnur6327 - https://github.com/lowkey0808/CVE-2021-43857 - https://github.com/ltfafei/ltfafei - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/plzheheplztrying/cve_monitor - https://github.com/soosmile/POC - https://github.com/terribledactyl/Gerapy_RCE_0.9.7 - https://github.com/trhacknon/Pocingit - https://github.com/zecool/cve