Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2024-37032
PoC https://www.wiz.io/blog/probllama-ollama-vulnerability-cve-2024-37032
The text was updated successfully, but these errors were encountered:
may need rogue registry server, hard for nuclei interactsh. make a poc here https://github.com/Bi0x/CVE-2024-37032
Hello everyone,
I created a working template here
Regards
It's easy to do this passively if you can hit the /api/version endpoint
The result of hitting the endpoint is
{ "version": "0.1.48" }
If you extract and check that it's greater than 0.1.33 that should do it without actually performing code execution
Hi @karkis3c i have raised a PR for the template that you shared #10218
Thank you once again
Template for?
CVE-2024-37032
Details:
PoC
https://www.wiz.io/blog/probllama-ollama-vulnerability-cve-2024-37032
The text was updated successfully, but these errors were encountered: