hacktricks/pentesting/pentesting-web/werkzeug.md

15 lines
322 B
Markdown
Raw Normal View History

# werkzeug
If debug is active you could try to access to `/console` and gain RCE.
```python
__import__('os').popen('whoami').read();
```
![](../../.gitbook/assets/image%20%28348%29.png)
There is also several exploits on the internet like [this ](https://github.com/its-arun/Werkzeug-Debug-RCE)or one in metasploit.