关联漏洞
Description
Exploit for the CVE-2019-16278 vulnerability
介绍
# CVE-2019-16278

This is an exploit for the CVE-2019-16278 vulnerability.
It allows remote code execution on an **nhttpd** server *v1.9.6*.
## Building from Source
This tool is written in Rust and you need to install the Rust compiler which is super easy if you follow the instructions in their [page](https://www.rust-lang.org/tools/install)
### Compiling
Once you have the compiler and `cargo` installed, you can run:
```bash
cargo build
```
## Example
```bash
./cve-2019-16278 10.10.1.1 80 "cat /etc/passwd"
```
This example connects to the host 10.10.1.1 on port 80 and executes the `cat /etc/passwd` on the remote host.
文件快照
[4.0K] /data/pocs/6bb43ef632604da7bfdf709748161daa8c57f831
├── [ 379] Cargo.lock
├── [ 220] Cargo.toml
├── [ 707] README.md
└── [4.0K] src
├── [1.2K] exploit.rs
└── [ 834] main.rs
1 directory, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。