Share
## https://sploitus.com/exploit?id=6808FB23-1224-5314-BBED-537742A9E382
# CVE-2023-30861 PoC (Proof of Concept)
> β οΈ **μ£Όμ (CAUTION)**
> μ΄ νλ‘μ νΈλ Flaskμ CVE-2023-30861 μ·¨μ½μ μ μ¬ννκΈ° μν λͺ©μ μ PoCμ
λλ€.
> **μ λλ‘ μΈν°λ·μ λ
ΈμΆλ νκ²½μμ μ€ννμ§ λ§μΈμ.**
> μΈλΆ μ κ·Όμ΄ κ°λ₯ν λ€νΈμν¬μ μ°κ²°λλ©΄ μ€μ 곡격μ μ
μ©λ μ μμ΅λλ€.
> β οΈ **WARNING**
> This project is a Proof of Concept (PoC) for demonstrating CVE-2023-30861 in Flask.
> **Do NOT run this on a publicly accessible environment.**
> Exposure to the internet may lead to real-world exploitation.
---
## π¦ νλ‘μ νΈ κ°μ (Project Overview)
Flaskμ reverse proxy μΊμ μλ² κ°μ μΈμ
μ²λ¦¬ μ€λ₯λ‘ μΈν΄ λ°μνλ 보μ μ·¨μ½μ μ ν
μ€νΈνλ νκ²½μ μ 곡ν©λλ€.
Docker κΈ°λ°μ λ‘컬 νκ²½μμ μμ νκ² μ¬ννμΈμ.
This PoC sets up a safe, local Docker environment to reproduce a vulnerability caused by improper session handling between Flask and a reverse proxy cache server.
## π μ¬μ©λ² (How to Use)
### 1. μ€ν (Start)
```bash
chmod u+x ./app_build.sh
./app_build.sh
```
### 2. μ’
λ£ λ° μ 리 (Stop & Clean)
``` bash
docker compose rm -f
docker image prune -a
```
## π§ͺ API ν
μ€νΈ (API Testing)
HTTP μμ² μμλ `test.http` νμΌμ μ°Έκ³ νμΈμ.
Use the `test.http` file to test and validate the PoC behavior using REST clients like VS Code REST Client or Postman.
## β
κΆμ₯ μ€ν νκ²½ (Recommended Execution Environment)
Docker & Docker Compose
Linux/MacOS (or WSL2 for Windows)
Local-only network (no public IP or domain exposed)
## π‘ μ°Έκ³ (Note)
μ΄ PoCλ νμ΅ λ° λΆμ λͺ©μ μ΄λ©°, μ΄λ€ 곡격μλ μ¬μ©ν΄μλ μ λ©λλ€.
This PoC is for educational and security research purposes only.
Do not use it for malicious activities.