关联漏洞
描述
Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.
介绍
# CVE-2019-16278 - Nostromo 1.9.6 RCE
Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.
## Help
```
usage: CVE-2019-16278.py [-h] [-t TARGET] [-p PORT] [-c COMMAND] [-b BYTES]
Exploit for CVE-2019-16278 - Nostromo 1.9.6 RCE
optional arguments:
-h, --help show this help message and exit
-t TARGET, --target TARGET
Remote host to target
-p PORT, --port PORT Remote port to target
-c COMMAND, --command COMMAND
Command to execute on the server
-b BYTES, --bytes BYTES
The number of bytes to receive back in the response
```
## Usage
Run the exploit
```bash
python CVE-2019-16278.py -t 10.10.10.10. -p 80 -c whoami
```
Run the exploit and recieve more bytes in the response
```bash
python CVE-2019-16278.py -t 10.10.10.10. -p 80 -c whoami -b 4096
```
文件快照
[4.0K] /data/pocs/5504050db6a1f89b3f124fd8c747155acd3d26fd
├── [1.1K] CVE-2019-16278.py
└── [ 863] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。