Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-7609 PoC — Elasticsearch Kibana 代码注入漏洞

Source
Associated Vulnerability
Title:Elasticsearch Kibana 代码注入漏洞 (CVE-2019-7609)
Description:Elasticsearch Kibana是荷兰Elasticsearch公司的一套开源的、基于浏览器的分析和搜索Elasticsearch仪表板工具。 Kibana 5.6.15之前版本和6.6.1之前版本中的Timelion visualizer存在安全漏洞。远程攻击者可通过发送请求利用该漏洞执行JavaScript代码并可能以Kibana进程权限执行任意命令。
Description
exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts
Readme
# CVE-2019-7609
exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts



**snapshot**

![exploit](exploit.png)



**usage**

```python
# python2 CVE-2019-7609-kibana-rce.py -h

usage: CVE-2019-7609-kibana-rce.py [-h] [-u URL] [-host REMOTE_HOST]
                                   [-port REMOTE_PORT] [--shell]

optional arguments:
  -h, --help         show this help message and exit
  -u URL             such as: http://127.0.0.1:5601
  -host REMOTE_HOST  reverse shell remote host: such as: 1.1.1.1
  -port REMOTE_PORT  reverse shell remote port: such as: 8888
  --shell            reverse shell after verify

```

File Snapshot

[4.0K] /data/pocs/f80f68aab625956039f4f9dcdc3d1872b0847128 ├── [4.9K] CVE-2019-7609-kibana-rce.py ├── [ 30K] exploit.png ├── [1.0K] LICENSE └── [ 630] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.