A curated list of exploitable options when dealing with argument injection bugs!
Vectors listed below are not vulnerabilities in the associated programs but rather intended features that were proven to be useful to attackers in very specific scenarios. Please don’t report or request CVEs for them.
If you would like to know more on this topic, you can visit:
What’s the difference with GTFOBins?
GTFOBins’ goal is to “bypass local security restrictions in misconfigured systems”, and that’s not what we’re trying to achieve with our project. We want to provide a list dedicated to helping vulnerability researchers to exploit argument injection bugs.
While some content from the two projects may overlap (i.e., when a sudoer rule allows arbitrary parameters on a command), having a separate list dedicated to these vectors is also more efficient. Users spend less time filtering out vectors that won’t apply in their case and get access to similar public advisories and write-ups.
Contributions to this list are very welcome. Feel free to open issues on the repository if you would like to see payloads on a specific program, or a pull request if you are already aware of exploitable flags in a target. Links to public write-ups are appreciated when adding a payload.
The code of this website is based on GTFObins and is released under GNU General Public License v3.0.
The project is maintained by the Sonar R&D team. Find argument injection vulnerabilities in your code (and much more) with SonarCloud, free for open-source projects!