Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13 | https://github.com/mpgn/CVE-2018-17246 | POC Details |
| 2 | Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute JavaScript which could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-17246.yaml | POC Details |
| 3 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Kibana%20%E6%9C%AC%E5%9C%B0%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E%20CVE-2018-17246.md | POC Details |
| 4 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/kibana-cve-2018-17246.yml | POC Details |
| 5 | https://github.com/vulhub/vulhub/blob/master/kibana/CVE-2018-17246/README.md | POC Details | |
| 6 | A script to download specific Vulhub repository folder (kibana/CVE-2018-17246) from GitHub. | https://github.com/Almandev/Sub-folderFetcher | POC Details |
No public POC found.
Login to generate AI POCNo comments yet