Malayke / CVE-2023-33246_RocketMQ_RCE_EXPLOIT

CVE-2023-33246 RocketMQ RCE Detect By Version and Exploit
Apache License 2.0
98 stars 21 forks source link

There seems to be something wrong here #4

Closed hktalent closed 7 months ago

hktalent commented 7 months ago

There seems to be something wrong here

 hex_payload_length = hex(len(payload) - 4)[2:]
    payload = payload.hex().replace('000000cd000000','000000' + hex_payload_length + '000000')
    payload = bytes.fromhex(payload)

when: cmd len: 184

hex(len(payload) - 4) = 14e [2:] = e

Malayke commented 7 months ago
In [1]: payload='a'*184

In [2]: hex(len(payload) - 4)[2:]
Out[2]: 'b4'

In [3]: hex(len(payload) - 4)
Out[3]: '0xb4'

I guess you should running on python3