This repository contains a Python script to exploit a vulnerability in Flowmon that allows for gaining a reverse shell on the target system. The exploit leverages a flaw in the service.pdfs/confluence
endpoint to execute arbitrary commands on the server, resulting in a reverse shell connection.
-
Clone the repository to your local machine:
https://github.com/adhikara13/CVE-2024-2389.git
-
Navigate to the cloned directory:
cd CVE-2024-2389
-
Run the Python script:
python main.py
-
Follow the prompts to input the Flowmon host, your IP address, and the desired port.
This exploit is for educational purposes only. Unauthorized use of this script against systems you do not own or have explicit permission to test is illegal and unethical. Use at your own risk.
- Python 3.x
- Requests library (
pip install requests
)
Contributions are welcome! Feel free to submit pull requests or open issues for any improvements, bug fixes, or suggestions.