Share
## https://sploitus.com/exploit?id=3F3430A8-4CB6-542F-9873-B48FF94263D4
# CVE-2024-40348
POC for CVE-2024-40348 Bazaar v1.4.3 and prior. Will attempt to read /etc/passwd from target.

![Banner](screens/main.jpg)


## Overview

This is a bulk scanning and exploitation tool for CVE-2024-40348: Bazaar v1.4.3 allows unauthenticated attackers to execute a directory traversal. This vulnerability was discovered by [4rdr](https://github.com/4rdr/proofs/blob/main/info/Bazaar_1.4.3_File_Traversal_via_Filename.md).

## How to Use

### Minimum Requirements

- Python 3.6 or higher
  
### Single Target:
```sh
python CVE-2024-40348.py -u http://target:7809 -p /etc/passwd
```

### Bulk Sscan:
```sh
python CVE-2024-40348 -f file.txt -p /etc/passwd
```

## Contact

For any suggestions or thoughts, please get in touch with [me](https://x.com/MohamedNab1l).


## Disclaimer

I like to create my own tools for fun, work and educational purposes only. I do not support or encourage hacking or unauthorized access to any system or network. Please use my tools responsibly and only on systems where you have clear permission to test.

## References

- https://nvd.nist.gov/vuln/detail/CVE-2024-40348
- https://github.com/4rdr/proofs/blob/main/info/Bazaar_1.4.3_File_Traversal_via_Filename.md