Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-5029 PoC — Exhibitor 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Exhibitor 操作系统命令注入漏洞 (CVE-2019-5029)
Description:Exhibitor是一款用于ZooKeeper的协同处理实例监视、备份/恢复、清理和可视化的程序。 Exhibitor 1.0.9版本至1.7.1版本中的Config编辑器存在操作系统命令注入漏洞。攻击者可利用该漏洞执行任意命令。
Description
This is a Python script PoC for CVE-2019-5029
Readme
# CVE-2019-5029
This is a Python script PoC for CVE-2019-5029. It is a RCE for Exhibitor Web UI 1.7.1.

## How to use

Clone this repo
``
git clone https://github.com/yZ1337/CVE-2019-5029.git
``

Execute as follows
``
python3 CVE-2019-5029.py <TARGET_IP> <TARGET_PORT> <ATTACKER_IP> <ATTACKER_PORT>
``

Make sure the request inside the script is the same as the request of the Config.
File Snapshot

[4.0K] /data/pocs/ccb61698fa4f6f3ef5cc95a110f9773b1b828248 ├── [2.2K] CVE-2019-5029 ├── [ 11K] LICENSE └── [ 385] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.