目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2019-16278 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via a crafted HTTP request.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
nostromo nhttpd 路径遍历漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
nostromo nhttpd是一款开源的Web服务器。 nostromo nhttpd 1.9.6及之前版本中的‘http_verify’函数存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
-n/a n/a -
二、漏洞 CVE-2019-16278 的公开POC
#POC 描述源链接神龙链接
1Directory transversal to remote code executionhttps://github.com/jas502n/CVE-2019-16278POC详情
2CVE-2019-16728 Proof of Concepthttps://github.com/imjdl/CVE-2019-16278-PoCPOC详情
3CVE-2019-16278Nostromo httpd命令执行https://github.com/ianxtianxt/CVE-2019-16278POC详情
4CVE-2019-16278 Python3 Exploit Codehttps://github.com/darkerego/Nostromo_Python3POC详情
5A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. https://github.com/AnubisSec/CVE-2019-16278POC详情
6Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.https://github.com/theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCEPOC详情
7(Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal https://github.com/Kr0ff/cve-2019-16278POC详情
8CVE-2019-16278:Nostromo Web服务器的RCE漏洞https://github.com/NHPT/CVE-2019-16278POC详情
9Exploit for the CVE-2019-16278 vulnerabilityhttps://github.com/keshiba/cve-2019-16278POC详情
10Nonehttps://github.com/crypticdante/CVE-2019-16278POC详情
11A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments.https://github.com/alexander-fernandes/CVE-2019-16278POC详情
12This is a exploit of CVE-2019-16278 for Nostromo 1.9.6 RCE. This exploit allows RCE on the victim machine.https://github.com/FredBrave/CVE-2019-16278-Nostromo-1.9.6-RCEPOC详情
13Nostromo 1.9.6 reverse shellhttps://github.com/0xTabun/CVE-2019-16278POC详情
14Nonehttps://github.com/H3xL00m/CVE-2019-16278POC详情
15Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.https://github.com/aN0mad/CVE-2019-16278-Nostromo_1.9.6-RCEPOC详情
16Nonehttps://github.com/n3ov4n1sh/CVE-2019-16278POC详情
17Nonehttps://github.com/c0d3cr4f73r/CVE-2019-16278POC详情
18Nonehttps://github.com/Sp3c73rSh4d0w/CVE-2019-16278POC详情
19Nonehttps://github.com/0xwh1pl4sh/CVE-2019-16278POC详情
20Nonehttps://github.com/N3rdyN3xus/CVE-2019-16278POC详情
21Nonehttps://github.com/NyxByt3/CVE-2019-16278POC详情
22Nonehttps://github.com/h3xcr4ck3r/CVE-2019-16278POC详情
23Nonehttps://github.com/n3rdh4x0r/CVE-2019-16278POC详情
24This repository contains an exploit for CVE-2019-16278 in Nostromo Web Server 1.9.6, allowing remote code execution via a directory traversal vulnerability. The script uses pwntools to establish a reverse shell. For educational and authorized testing use only.https://github.com/cancela24/CVE-2019-16278-Nostromo-1.9.6-RCEPOC详情
25An unauthenticated attacker can force server points to a shell file like ‘/bin/sh’ and execute arbitrary commands due to the failure in verifying the URL which leads to path traversal to any file that exists in the system. Nostromo’s versions such as 1.9.6 fail to verify this URL https://github.com/CybermonkX/CVE-2019-16278_Nostromo-1.9.6---Remote-Code-ExecutionPOC详情
26nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via directory traversal in the function http_verify.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-16278.yamlPOC详情
27Nonehttps://github.com/h3x0v3rl0rd/CVE-2019-16278POC详情
28Remote Code Execution exploit for Nostromo nhttpd ≤ 1.9.6. Exploits directory traversal vulnerability using URL-encoded CRLF characters to execute arbitrary commandshttps://github.com/andknownmaly/CVE-2019-16278POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2019-16278 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2019-16278

暂无评论


发表评论