Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15813 PoC — Sentrifugo 代码问题漏洞

Source
Associated Vulnerability
Title:Sentrifugo 代码问题漏洞 (CVE-2019-15813)
Description:Sentrifugo是一套人力资源管理系统。该系统包括人力资源管理、绩效考核、招聘管理和资产管理等功能。 Sentrifugo 3.2 版本中存在代码问题漏洞。攻击者可利用该漏洞绕过文件上传限制,执行代码。
Description
This container was made to explain and demonstrate how CVE-2019-15813 (Sentrifugo works)
Readme
# CVE-2019-15813
This container was made to explain and demonstrate how CVE-2019-15813 (Sentrifugo works)

# Sentrifugo V3.2
Sentrifugo is a Human Resource Management System

# How to Install
docker-compose up


# Default crentials to test
----Super Admin----
Username : empp0001
Password : 5faa7bdf3d7af

---Employee----
Username: EMPP123
Password: bygedupub

--Reverse PHP shell--
Extract resume.zip (Archived because windows defender may delete it)
Edit the IP and Port


File Snapshot

[4.0K] /data/pocs/c024f278b7d712daffc327ec9e36154876505463 ├── [ 24M] CVE2019.part01.rar ├── [ 24M] CVE2019.part02.rar ├── [ 24M] CVE2019.part04.rar ├── [ 24M] CVE2019.part05.rar ├── [ 24M] CVE2019.part06.rar ├── [ 24M] CVE2019.part07.rar ├── [ 17M] CVE2019.part08.rar ├── [ 24M] CVE2019R.part03.rar ├── [ 475] README.md └── [725K] report.pdf 0 directories, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.