# Maltrail v0.53 RCE
PoC for Maltrail v0.53 RCE

I could not get the other PoCs to work correctly so I put this one together.  Very similar to others but uses requests instead of subprocess.

Uses a python3 rev shell, but the `command` variable inside the `send_data` method can be changed to whatever is needed. 

## Usage
python3 <attack_box_ip> <attack_box_port> <target_url>

## Testing

**Start Listener Box**
nc -nlvp 1337

**run the exploit**
python3 1337 http://vulnerable-maltrail.local

## Disclaimer
This is intended for educational purposes and legal use only.
Always obtain proper authorization before performing penetration testing or exploiting vulnerabilities.