Files
CVEs-PoC/2014/CVE-2014-7205.md
T
2024-06-18 02:51:15 +02:00

34 lines
1.4 KiB
Markdown

### [CVE-2014-7205](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7205)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Eval injection vulnerability in the internals.batch function in lib/batch.js in the bassmaster plugin before 1.5.2 for the hapi server framework for Node.js allows remote attackers to execute arbitrary Javascript code via unspecified vectors.
### POC
#### Reference
- https://www.exploit-db.com/exploits/40689/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AndrewTrube/CVE-2014-7205
- https://github.com/BLACKHAT-SSG/OSWE-Preparation-
- https://github.com/MdTauheedAlam/AWAE-OSWE-Notes
- https://github.com/PwnAwan/OSWE-Preparation-
- https://github.com/R0B1NL1N/OSWE
- https://github.com/Xcod3bughunt3r/OSWE
- https://github.com/alanshaw/nsp-advisories-api
- https://github.com/kymb0/web_study
- https://github.com/maximilianmarx/bassmaster-rce
- https://github.com/mishmashclone/ManhNho-AWAE-OSWE
- https://github.com/mishmashclone/timip-OSWE
- https://github.com/shreyaschavhan/oswe-awae-pre-preperation-plan-and-notes
- https://github.com/tatumroaquin/ssji-webapp
- https://github.com/tatumroaquin/vwa-ssji
- https://github.com/timip/OSWE
- https://github.com/zer0byte/AWAE-OSWP