Centreon v.19.04 Remote Code Execution exploit (CVE-2019-13024)# Centreon-RCE
Centreon v.19.04 Remote Code Execution exploit (CVE-2019-13024)
Revision of https://github.com/mhaskar/CVE-2019-13024
## HOW TO USE:
1. Edit argument defaults for convenience, or don't (bottom of script)
2. If needed, edit 'edit_command' function to defeat defenses
3. '-v' for troubleshooting/verbose output (prints response content)
# EXAMPLES:
./centreon_rce.py whoami
./centreon_rce.py -t http://127.0.0.1/centreon -u MikeJones -p M1k3j0nes whoami -v
# Requirements
Requires BeautifulSoup and Requests
```bash
pip3 install requests bs4
```
# CREDIT:
https://github.com/mhaskar/ (https://github.com/mhaskar/CVE-2019-13024)
https://nvd.nist.gov/vuln/detail/CVE-2019-13024
[4.0K] /data/pocs/7bbb0c015b4a0faf23464cbfd4cd2d8a1542cbe2
├── [4.9K] centreon_rce.py
└── [ 702] README.md
0 directories, 2 files