## https://sploitus.com/exploit?id=07EF0BB8-A699-5720-94E3-A88FCA26AEEA
# CVE-2023-33733 on Reportlab v3.6.12
This lab was set up to test CVE-2023-33733.
## Analyzing process
You can see our analyzing process about this CVE in PDF file on main repo.
## Setup and Run
### Server
#### Setup
```bash
pip3 install -r requirements.txt
```
#### Run
```bash
python3 app.py
```
### Attacker
#### Connect to server
Connect to server IP address
```http://{Server_IP}:4444```<br>
After running, you will see an interface like this, you can upload malicious HTML file to see the RCE.

#### Listening and uploading file
```bash
nc -lvnp 4444
```
Then, upload your evil.html and get the reverse shell
