SYM_PY_0061 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Command Shell in Externally Accessible Directory

Property Value
Language python
Severity low
CWE CWE-553: Command Shell in Externally Accessible Directory
Confidence Level Low
Impact Level Medium
Likelihood Level Low

Description

The code implements a reverse shell by connecting to a remote server and spawning a shell process (like /bin/sh), which can give an attacker remote command execution on your system. This behavior allows someone to control the affected machine over the network.

Impact

If exploited, an attacker could gain full remote access to the server, allowing them to run arbitrary commands, steal sensitive data, modify files, or use the machine as part of a larger attack. This can lead to complete system compromise and data breaches.