Share
## https://sploitus.com/exploit?id=79CEDDED-29F0-5F68-96BE-9990A4EB2B73
# Rocket-Chat-3.12.1-PoC-CVE-2021-22911-

1. Go login page
   
![obraz](https://github.com/user-attachments/assets/d6e7929e-5f12-4412-bb5b-60b81a665298)

2. Register new account, set password as P@$$w0rd!1234
   
![obraz](https://github.com/user-attachments/assets/bc305527-228e-4d70-80a4-94840afa9712)

3. Run script
   
-u = Low priv user email [ No 2fa ]

-a = Administrator email

-t = URL (Eg: http://rocketchat.local)

python3 rocketchat.py -u zxc@zxc.zxc -a admin@chatty.offsec -t http://192.168.169.164:3000

4. Execute any code with RCE. (no result of execution shown)

   ![obraz](https://github.com/user-attachments/assets/11de1e93-f879-4a8b-8deb-7c1df031e3ba)




revshell.com -> interactive shell

![obraz](https://github.com/user-attachments/assets/e3daaf00-a5a0-43c0-9572-59df29a58983)


source:50108.py