## https://sploitus.com/exploit?id=0EB6B65D-3193-5852-BF7D-E247895D1540
# CVE-2024-21534: Remote Code Execution Vulnerability in `jsonpath-plus` (<=10.0.7)
## Summary
This repository contains a Proof of Concept (PoC) exploit for a critical Remote Code Execution (RCE) vulnerability in the `jsonpath-plus` package, affecting versions prior to 10.0.7. The issue stems from improper input sanitization, allowing attackers to execute arbitrary code by leveraging unsafe defaults in Node’s VM module. The vulnerability was published 2024-10-11 and has a **CVSS Score** of 9.8 (Critical).
**Note:** Although an attempt to mitigate this vulnerability was made in [version 10.0.0](https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3), the flaw remains exploitable under certain payload variations as discussed in [issue #226](https://github.com/JSONPath-Plus/JSONPath/issues/226).
---
### Description
The vulnerability enables remote attackers to execute arbitrary code on affected systems due to the unsafe usage of the VM in Node.js. This vulnerability was initially addressed in version 10.0.0, but further investigation revealed it could still be exploited with specific payloads.
---
## Exploit Setup and Reproduction
### Prerequisites
To reproduce the exploit, ensure you have the following tools installed:
- Docker
Use the provided assets to build your own image or use the image I published in Dockerhub:
### Steps to Reproduce
1. Clone this repository:
```bash
git clone https://github.com/your-username/CVE-2024-XXXX-PoC.git
cd CVE-2024-XXXX-PoC
TODO
```
---
A special thanks to Andrea Angelo Raineri for his contribution to the identification and reporting of this vulnerability,
and for his kind assistance to find the right query to exploit the vulnerability.