POC详情: 547ff89e1a5e88d94d90a8b3d80847323cd80165

来源
关联漏洞
标题: Elasticsearch Kibana 代码注入漏洞 (CVE-2019-7609)
描述:Elasticsearch Kibana是荷兰Elasticsearch公司的一套开源的、基于浏览器的分析和搜索Elasticsearch仪表板工具。 Kibana 5.6.15之前版本和6.6.1之前版本中的Timelion visualizer存在安全漏洞。远程攻击者可通过发送请求利用该漏洞执行JavaScript代码并可能以Kibana进程权限执行任意命令。
介绍
# CVE-2019-7609-KibanaRCE
Minor changes were made to the CVE to make it compatible with Python 3. cve-modific.py

Here are the modifications: In the get_kibana_version() function, the line match = re.findall(pattern, r.content) was updated to match = re.findall(pattern, r.text). This change was made to use r.text instead of r.content, allowing the response to be treated as a string rather than bytes.

![Captura de tela de 2023-07-16 21-35-30](https://github.com/OliveiraaX/CVE-2019-7609-KibanaRCE/assets/131061822/59de3ace-e334-46ac-8501-c7b9d12d7882)

![Captura de tela de 2023-07-16 21-50-42](https://github.com/OliveiraaX/CVE-2019-7609-KibanaRCE/assets/131061822/f33a1461-6d17-4877-bdf7-9733e60086bd)
For educational purposes This script is intended for educational use only.

Original: https://github.com/LandGrey/CVE-2019-7609/
文件快照

[4.0K] /data/pocs/547ff89e1a5e88d94d90a8b3d80847323cd80165 ├── [4.9K] cve-modific.py └── [ 837] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。