# CVE-2019-11447 CuteNews 2.1.2 Reverse Shell Upload
A slightly modified version of the [Mt-Code POC](https://github.com/mt-code/CVE-2019-11447) which spawns a full reverse shell rather than a web shell.
This exploit uses the famous [PentestMonkey PHP Reverse Shell](https://github.com/pentestmonkey/php-reverse-shell).
### Install
`pip install -r requirements.txt`
### Example use:
* Create a user on the application
* Run the following
`python exploit.py http://{target}/index.php {myuser} {mypassword}`
* Open a listener and navigate to the path listed by the exploit.

Disclaimer: I do not take credit for the creation of either of these scripts.
**Follow the law.**
[4.0K] /data/pocs/b2c01b20ae4d3401d9a4ecc1e5e123523d0af5ad
├── [ 93K] example.png
├── [3.4K] exploit.py
├── [ 699] README.md
├── [ 79] requirements.txt
└── [2.5K] revshell.php
0 directories, 5 files