Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-16278 PoC — nostromo nhttpd 路径遍历漏洞

Source
Associated Vulnerability
Title:nostromo nhttpd 路径遍历漏洞 (CVE-2019-16278)
Description:nostromo nhttpd是一款开源的Web服务器。 nostromo nhttpd 1.9.6及之前版本中的‘http_verify’函数存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
Description
Exploit for the CVE-2019-16278 vulnerability
Readme
# CVE-2019-16278

![Rust](https://github.com/keshiba/cve-2019-16278/workflows/Rust/badge.svg)

This is an exploit for the CVE-2019-16278 vulnerability.

It allows remote code execution on an **nhttpd** server *v1.9.6*.

## Building from Source
This tool is written in Rust and you need to install the Rust compiler which is super easy if you follow the instructions in their [page](https://www.rust-lang.org/tools/install)

### Compiling
Once you have the compiler and `cargo` installed, you can run:
```bash
cargo build
```

## Example
```bash
./cve-2019-16278 10.10.1.1 80 "cat /etc/passwd"
```
This example connects to the host 10.10.1.1 on port 80 and executes the `cat /etc/passwd` on the remote host.
File Snapshot

[4.0K] /data/pocs/6bb43ef632604da7bfdf709748161daa8c57f831 ├── [ 379] Cargo.lock ├── [ 220] Cargo.toml ├── [ 707] README.md └── [4.0K] src ├── [1.2K] exploit.rs └── [ 834] main.rs 1 directory, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.