Share
## https://sploitus.com/exploit?id=0EB6B65D-3193-5852-BF7D-E247895D1540
# CVE-2024-21534: Remote Code Execution Vulnerability in `jsonpath-plus` (<=10.0.7)

## Summary

This repository contains a Proof of Concept (PoC) exploit for a critical Remote Code Execution (RCE) vulnerability in the `jsonpath-plus` package, affecting versions prior to 10.0.7. The issue stems from improper input sanitization, allowing attackers to execute arbitrary code by leveraging unsafe defaults in Node’s VM module. The vulnerability was published 2024-10-11 and has a **CVSS Score** of 9.8 (Critical).

**Note:** Although an attempt to mitigate this vulnerability was made in [version 10.0.0](https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3), the flaw remains exploitable under certain payload variations as discussed in [issue #226](https://github.com/JSONPath-Plus/JSONPath/issues/226).

---

### Description

The vulnerability enables remote attackers to execute arbitrary code on affected systems due to the unsafe usage of the VM in Node.js. This vulnerability was initially addressed in version 10.0.0, but further investigation revealed it could still be exploited with specific payloads.

---

## Exploit Setup and Reproduction

### Prerequisites

To reproduce the exploit, ensure you have the following tools installed:
- Docker

Use the provided assets to build your own image or use the image I published in Dockerhub:

### Steps to Reproduce

1. Clone this repository:
  
   ```bash
   git clone https://github.com/your-username/CVE-2024-XXXX-PoC.git
   cd CVE-2024-XXXX-PoC
   TODO
   ```


---

A special thanks to Andrea Angelo Raineri for his contribution to the identification and reporting of this vulnerability,
and for his kind assistance to find the right query to exploit the vulnerability.